Mantiq - Agile Testing Consultancy - Specialised in Functional & Non-Functional Automated Testing

Automate My Test (cloud based testing framework for Agile/CI/CD)

Easy to use cloud based collaborative multi-layered API and UI Automation Functional, Data Migration and UAT Testing Framework designed for PO's, BA's and QA's . Centralising & using all your test assets within one framework utilising best of machine learning and AI. An integrated execution monitoring and reporting for CI/CD


  • Managment and detailed reporting on system functionality testing status
  • Built to support latest technologies API and AI systems
  • Post Deployment Environment System Integration Testing & Monitoring status
  • Fully integrated with Deployment Pipelines (e.g. Jenkins)
  • Fully integrated with Bug tracking tools (e.g. Jira)
  • Multi-user and team member collaboration on preparing automated tests
  • Easy Test automaton preparation for Dev Test and Business users
  • Scalable Multi-layered Automated Test Executions Parallel and Sequential
  • Execution all Mobile & Desktop OS Platform and Browsers
  • BDD features ready for Agile Delivery Teams


  • Automating Functional Health and Status checking
  • Automating System Performance Health and Status checking
  • Automating System Integration and Environment Smoke Testing & Monitoring
  • Meaningful and relevant reports to Managment and business stakeholders
  • Centralised maintenance of API Front-end and Integrations tests
  • Test coverage analysis tool for multilayered systems
  • Schedule and event test execution with automated email reporting
  • Time savings with reporting mechanism Integrated fully with CI Pipelines
  • Ready to interact with multi-layers of most systems
  • System integration Testing and Data Migration Testing Service Support


£0 to £199 per user per month

Service documents


G-Cloud 11

Service ID

3 8 5 8 6 7 0 8 9 2 2 9 4 8 6


Mantiq - Agile Testing Consultancy - Specialised in Functional & Non-Functional Automated Testing

Mohamed Hussain


Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints
System requirements
Runs locally or from the cloud or Intranet Network

User support

Email or online ticketing support
Email or online ticketing
Support response times
No Weekend support
User can manage status and priority of support tickets
Online ticketing support accessibility
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
Web chat accessibility testing
We provide all levels of support from business user guidance to technical support for free on our Software+Support Package.
We usually fix all bug and features for free, also often we build bespoke features useful for each one of our clients.
Onsite support
Yes, at extra cost
Support levels
We provide all levels of support from business user guidance to technical support for free on our Software+Support Package.

For all tool related features we usually fix all bug and features for free, in addition we may build bespoke features useful for each one of our clients.

For Data Migration projects we offer full Legacy to Cloud based support and Mapping Validation at both DB and at System interface level using AMT.
Support available to third parties

Onboarding and offboarding

Getting started
Onsite training
Video training
Online User Documentation
Online Chat and Email
Service documentation
Documentation formats
End-of-contract data extraction
Users can delete the account and all the data on the account which will HARD Delete all data and wipe the whole instance with the Database.
End-of-contract process
Client can choose to end the contract any anytime and choose to backup and export their data and then delete the account if they wish with all their data at free of charge.
We do not lock or charge any fees for client/s or users wishing to end their service as all software access is charged via the licensing or membership fee
We offer a free Standalone Desktop version of the app which all the data he held only on the user machine.
As for the cloud solution there are two main Licences: Cloud based or Dedicated Server based,
The cloud based is a subscription licence which is renewed on monthly bases.
The Dedicated Server instance is hosted on the Client's Dedicated or Internal Servers and therefore the Client is in full control of the data centre the app is hosted on.
We offer a wide range of Add-ons which are designed to extend the capability of the app and those Add-ons have an additional cost associated with them.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Compatible operating systems
  • Linux or Unix
  • MacOS
  • Windows
Designed for use on mobile devices
Service interface
What users can and can't do using the API
All Features of the application are usable via the API
API documentation
API documentation formats
API sandbox or test environment
Customisation available
Description of customisation
Yes they can add new libraries for extensions and addons to utilise the framework


Independence of resources
All our platform instances on a cloud based server are fully scalable automatically.

Where the client chooses to self host the platform on their local servers then they can also easily scale the instances and self host the platform on multiple server instances as well as move each instance to a bigger server since the application is setup as virtual containers/images

We have designed our infrastructure to be based on Kubernetes which means all scalability is automated on all instances of our application or at least can be configured to do soo automatically


Service usage metrics
Metrics types
The Services matrix mainly tracks the number of executions and the reports for those executions such as the browsers the tests were ran on
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports


Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Protecting data at rest
Encryption of all physical media
Data sanitisation process
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
All project and test data can be simply exported with a single button on the application
Data export formats
Data import formats

Data-in-transit protection

Data protection between buyer and supplier networks
Private network or public sector network
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
99.9% availability guaranteed - any downtime due to our service delivery failure in our control will be compensated with free credit and time to use the service.
Client/s and User/s are fully in control of updating the latest software so thy can manage any backup and downtime (if any).
Approach to resilience
All databases are on cloud based RDS instances which are backed up at all times and prior to any changes to the platform or updates a full snapshot is taken from the previous instance.
Outage reporting
Application Dashboard
email alerts

Identity and authentication

User authentication needed
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
We have different user level permission - and the Super Admin user access is granted manually by another company user
Access restriction testing frequency
At least once a year
Management access authentication
2-factor authentication

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
No audit information available
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
CSA CCM version 3.0
Information security policies and processes
Our security measures are in line and as per to the request from the government departments that use our service

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
All our services are tracked via our tracking tool and any new features and configurations is raised a as a ticket for each of our clients

Any customised changes for specific clients will only be available to that client
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
We constantly monitor and test our process and introduce new measurements using latest tracking and reporting tools to enable us to analysis any issues fast and have a patch ready for all our clients
Protective monitoring type
Protective monitoring approach
Each area is assessed within its domain - for example infrastructure is assessed and monitored differently from the app it self - we have implemented different strategies at each level to be able to handle them within their domain automatically where possible - in other areas we have dedicated resources which will be responding to escalated incidents
Incident management type
Incident management approach
We have predefined strategies as well as report based incident manament, these reports are all transparent in the user dashboard

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks


£0 to £199 per user per month
Discount for educational organisations
Free trial available
Description of free trial
Standalone: Always free and all features are enabled on user machine, user can Prepare, configure and Execute all tests developed

Cloud/Self-Hosted based version: All the core app services are enabled and it is valid for 1 week for the trial version
Link to free trial

Service documents

Return to top ↑