Centerprise International Ltd

Centerprise Boomi Integration Platform as a Service (IPaaS) by Dell

Centerprise Boomi, provided by Dell, is the leading provider of cloud integration and workflow automation for building the Connected Business. Our technologies connect applications, assure data quality and automate business processes. Our cloud-native, low-code platform helps more than 6,500 organisations run better, faster and smarter.


  • Application and Data Integration
  • HUB - Master Data Hub
  • Back to Back (B2B) Electronic Data Interchange (EDI) Management
  • Application Programming Interface (API) Design and Management
  • Boomi Flow - Workflow Automation and Application Development


  • Integrate any endpoint combination of applications
  • Synchronise and enrich trusted data across your enterprise
  • Achieve interoperability between your internal system and trading partners
  • Modernise and expose underlying APIs to deliver real-time interactions
  • Automate workflows on any channel, device or platform
  • Business agility achieved through modern integration approach to digital transformation
  • Enterprise grade solution with global reach
  • Provides true ease of use and faster time to value
  • Single platform moves, manages and governs data across the enterprise
  • Lower TCO - no hardware, software or maintenance costs


£374 to £8,980 a unit a month

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 12

Service ID

3 8 0 1 9 3 0 5 5 4 9 9 0 8 2


Centerprise International Ltd Tenders Team
Telephone: 01256 378 000

Service scope

Service constraints
The Dell Boomi platform is designed for and has been tested at a minimum screen resolution of 1366 x 768. Platform applications should function and display properly at this resolution and at higher resolutions. NOTE: All browsers must have JavaScript and cookies enabled. Dell Boomi supports TLS version 1.1 and TLS version 1.2 in the supported browsers. SSL version 3.0 has been disabled due to the Poodle vulnerability.
System requirements
  • The Dell Boomi platform supports Microsoft Edge
  • The Dell Boomi platform supports Microsoft Internet Explorer
  • The Dell Boomi platform supports Mozilla Firefox
  • The Dell Boomi platform supports Google Chrome
  • The Dell Boomi platform supports Apple Safari

User support

Email or online ticketing support
Email or online ticketing
Support response times
There is no guaranteed response time for support cases submitted via email. If the customer's need for managed support cases exceeds 15 email requests in a year, they may purchase additional cases in blocks of five for $1,300.
User can manage status and priority of support tickets
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
Boomi is currently working to improve the accessibility of our platform and achieve compliance with WCAG. Currently all web interfaces are AA level compliant for colours and contrast. We have increased the size of actionable icons, and all images have alt text. We are working on full keyboard navigability. As well, we have started working with an accessibility consultant to guide our work going forward.
The user may use built it browser functionality to enlarge text, but the product itself does not have a specific feature to modify size.
Web chat accessibility testing
No web chat specific testing has been done. However, tests on keyboard, colour and contrast settings, flashing and/or blinking texts have been carried out on the Boomi platform.
Onsite support
Yes, at extra cost
Support levels
To accommodate your application integration and data management needs, Dell Boomi provides three levels of support: Standard, Premier, and Premier Plus. • Standard—Standard support is included at no charge with all Dell Boomi subscriptions. • Premier—Premier support is available for Professional, Enterprise or Enterprise Plus edition customers. The cost of Premier support is 25% of the total annual subscription price, including extra data source connections, add-ons, and upgrades. • Premier Plus—Premier Plus support is available only to Enterprise and Enterprise Plus edition customers. The cost of Premier Plus support is 35% of the total annual subscription price (£25,000 annual minimum). Predictive Assistance—With our Predictive Assistance technology we can see the overall health of our entire customer population, and whether an individual customer—like you—is having an issue that we can help resolve. It’s all part of how we help Dell Boomi
customers increase their ROI from our platform. You will be assigned a Customer Success Manager. Customer Account Reviews – We offer you an annual technical account, conducted via web conference. These reviews are an excellent opportunity to increase your understanding of the Boomi platform and explore ways in which Boomi can further support your business.
Support available to third parties

Onboarding and offboarding

Getting started
Complimentary online training is provided to Boomi clients. In addition, our professional services offer a 5-day JumpStart program which takes a hybrid approach to training and consulting. One of our highly skilled integration experts will travel to your facility and work hand-in-hand with a team of your IT and integration specialists. After your team is trained on our platform, they will be guided through a pilot project of your choice that fits your unique business objectives. Included in the 5-day program is a 3-day Integration Developer I training session, which enables your team
to become Boomi Integration Developer Level 1 Certified. JumpStart packages are by far our most popular consulting engagements. Your team gains invaluable experience by building the foundation of an
integration process that fits your business objectives while receiving hands-on training and assistance.
Service documentation
Documentation formats
End-of-contract data extraction
The Integration Platform as a Service doesn't hold any of our clients "data" - the platform allows you to integrate your data with your systems. Any integrations that you create within the platform, can be downloaded from the portal and saved on a local drive or storage system.
End-of-contract process
At the end of the contract the integration platform will no longer continue to be accessible to the customer. No action is required to be undertaken by the customer. There are no additional costs at the end of
the contract.

Using the service

Web browser interface
Using the web interface
From the Dell Boomi platform at, the following Dell Boomi applications are available: AtomSphere — enables application integration for anything, anytime, anywhere. Master Data Hub — enables you to keep the data representing the “nouns” of your company’s business clean, accurate and consistent. API Management — enables you to create, publish and centrally manage APIs on-premise or in the cloud. Flow — provides a low-code development platform to create customer journeys and automate simple and sophisticated workflows to efficiently drive your business. The following are common elements across the platform: Accounts and users — ability to manage account-level settings and user information on the Setup page. Data security — security measures include certificates, secure data centre and data communication, and password encryption. Session security — security measures include the ability to log out of all sessions at once, requiring users to log back in after a password change, and an optional session timeout feature. — continuously updated source of information about system availability, reliability, and performance.
Web interface accessibility standard
None or don’t know
How the web interface is accessible
The platform supports all popular web browsers.
Web interface accessibility testing
Not applicable.
What users can and can't do using the API
The AtomSphere API provides programmatic access to functionality that is normally accessed through the AtomSphere application. The API is built around an object/verb hierarchy. This hierarchy parallels the basic object-oriented programming paradigm as well as the web service implementation behind REST. Within the AtomSphere API: Objects represent structures and relationships within AtomSphere, such as Account, Account User Role, Atom Startup Properties, and Environment. Verbs are the various operations that you can perform for each object, such as GET, QUERY, and UPDATE. These verbs are referred to as object-based operations. Verbs that do not fall into the object/verb hierarchy, such as deployComponent and executeProcess, are referred to as action-based operations. All AtomSphere API calls are authenticated by AtomSphere user name and account ID. The account ID is used as the general context for any API call. For example, if you make an API call to execute a QUERY of the Account Group object with no query filters applied, all of the account groups owned by the authenticated account are returned. The AtomSphere API has been developed with both a RESTish and a SOAP implementation. NOTE: AtomSphere also provides: The AtomSphere Partner API, which supports additional partner-specific operations.
API automation tools
API documentation
API documentation formats
  • HTML
  • Other
Command line interface


Scaling available
Scaling type
  • Automatic
  • Manual
Independence of resources
There are two architecture options that your integration architects can use in designing your Boomi landscape to support high availability while also supporting your disaster recovery requirements: an Active/Passive
configuration or an Active/Active configuration. This document explains each of these options and their benefits so you can choose the best option for the organization:
Usage notifications
Usage reporting


Infrastructure or application metrics
Metrics types
  • Number of active instances
  • Other
Other metrics - continuously updated source of information about system availability
Reporting types
  • Real-time dashboards
  • Regular reports


Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Dell Boomi

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
  • United Kingdom
  • EU-US Privacy Shield agreement locations
User control over data storage and processing locations
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least every 6 months
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Encryption of all physical media
Data sanitisation process
Equipment disposal approach
A third-party destruction service

Backup and recovery

Backup and recovery

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Boomi’s goal is to achieve 99.99% Service Availability. Subject to 1c and 1d in the document in the URL (, if in any month the Service Availability is less than 99.99%, Boomi shall provide, as the sole and exclusive remedy, a credit to Customer in accordance with the following schedule, with the credit being calculated on the basis of the monthly service change for the affected service: Service Availability Credit Percentage<99.99% 10%, <99.00% 20%, <97.00% 35%, <95.00% 50%, <90.00% 100%.
Approach to resilience
Customers can deploy Boomi integrations and APIs to a run-time engine that provides high availability and disaster recovery out of the box, with no intervention needed by your internal teams. Boomi’s message queuing technology allows you to complete transactions with available systems, be they onpremise or SaaS, and replay those messages when your on-premise operational systems become available. In terms of business continuity, you can recover faster. You might lose connectivity to onpremise systems, but because your endpoints are in the cloud, you’re not losing data.
Outage reporting
Outages are reported on the public dashboard at and e-mail alerts are sent to the account administrator.

Identity and authentication

User authentication
Other user authentication
The AtomSphere single sign-on implementation uses SAML 2.0 with federated authentication. SAML 2.0 allows service providers (i.e., AtomSphere) to query the identity providers for authentication. AtomSphere supports both identity provider-initiated log-in and service provider-initiated log-in. Additional details can be found here:
Access restrictions in management interfaces and support channels
With the platform, an admin user has access to the User Management console. Within User Management tab, you add and maintain users, assign roles and privileges to users, and create custom roles to assign to users. A user corresponds to a unique email address that can be given direct access to one or more Boomi accounts. A role is assigned to a user to enable a list of privileges. A privilege is a right reserved to a role that allows a user to access or perform actions in a specific area of the Dell Boomi platform.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password
Devices users manage the service through
Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
Alcumus ISOQAR
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
N/A - Everything is covered by our ISO 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Who accredited the PCI DSS certification
PCI DSS accreditation date
What the PCI DSS doesn’t cover
N/A - Everything is covered by our PCI DSS accreditation.
Other security certifications
Any other security certifications
  • Cyber Security Essentials Plus
  • EU Privacy
  • SOC 2 Type II
  • SSAE 16 SOC 2 Type 1

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
In-line with the requirements of ISO 27001 and 20000, we've developed policies and procedures to support both standards and comply with the requirements of ISO 9001 e.g., our Information Security Policy includes the following internal policies/procedures: •IT Security Business Continuity Policy •Information Security Policy – Suppliers •CCTV Policy •CI Forensic Policy •Corporate Hospitality and Bribery Act •Access Control Policy •Policy Against Malicious Code •Child Protection Policy •Policy on the Secure Handling, Use, Storage, Retention and Destruction of Disclosure Information •Clear Desk
Policy •Cryptographic Policy. The Information Security Policy has been produced and accepted by the Board. The policy is visible to all staff on SharePoint and all staff sign Appendix E of the policy, which is retained in
the employee’s HR file. The importance of Information Security and the policy is covered in employee inductions and the Staff handbook. Security responsibilities are defined within our Information Security policy, which records the following managers: Service Delivery Manager (Information Security Manager) •Security Controller •Group Quality
Manager •Users – to comply with the IT Security Policy. Security Responsibilities are defined in the individual’s job description and employment contract.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
The Boomi Platform supports consumable formats, it can be reused across users and projects, its interchangeable and supports both on-premises and cloud environments. Change Management: All Boomi objects automatically save all versions with ability to restore and deploy any version. This flexible delivery capability is further enhanced by leveraging "Extensions" to the delivery integration pack. This allows sets of parameters to be defined external to the deployed integration objects that are unique to each environment in the release cycle.
Vulnerability management type
Vulnerability management approach
Vulnerability tests are identified as part of Dell Boomi's Risk Analysis Procedure, including regular internal penetrations and code scans, as well as yearly external penetrations tests.
Protective monitoring type
Protective monitoring approach
Reporting of Information Security Incidents and Violations Standard, applies, which can be shared under NDA. Dell Boomi has a policy for notifying customers in event of a security incident or breach. Security issues are treated similarly to production incidents. Customers are notified via the web site. This website provides system availability, reliability and performance information to customers, application vendors and system integrators. This site is available 24 hours per day, 7 days per week, so that you can check the current status of the Dell Boomi Atom Cloud, the MDM Atom Cloud and the Boomi platform any time.
Incident management type
Supplier-defined controls
Incident management approach
Our Reporting of Information Security Incidents and Violations Standard applies, which can be shared under NDA.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
Who implements virtualisation
Virtualisation technologies used
Other virtualisation technology used
Separate Tenants in our Single Instance cloud infrastructure for developing, testing and monitoring. Further physical separation occurs
at the runtime level, where a small JVM called an Atom can be installed on-premises or in the cloud depending on the individual customer’s preferences.
How shared infrastructure is kept separate
Separate Tennants in our Single Instance cloud infrastructure for developing, testing and monitoring. Further physical separation occurs
at the runtime level, where a small JVM called an Atom can be installed on-premises or in the cloud depending on the individual customer’s preferences.

Energy efficiency

Energy-efficient datacentres
Description of energy efficient datacentres
Data centres are in USA but conform to EU standards as they use Amazon Web Services:


£374 to £8,980 a unit a month
Discount for educational organisations
Free trial available
Description of free trial
Get instant access to the Dell Boomi AtomSphere Platform, FREE for 30 days, to see how easy it is to integrate your business applications, without coding. Once your trial expires, you'll have the option to fully subscribe to Boomi AtomSphere and deploy the integration processes you built during your trial.
Link to free trial

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.