IBM App Connect connects your applications in minutes - automating updates, notifications, and events, and keeping your data in sync between multiple applications. You can use it to connect applications in the cloud or local (on-premises) applications.
- SaaS application connectivity
- On premise application connectivity
- Automated updates, notifications & events between applications
- Trigger based actions between applications
- Data sync between applications
- Connect Off-Premise SaaS applications through a GUI interface.
- Connect SaaS applications to on-premise systems.
- Save employee-hours through time saving integration.
£549 per instance per month
- Free trial available
IBM United Kingdom Ltd
|Software add-on or extension||No|
|Cloud deployment model||Hybrid cloud|
|Service constraints||No constraints.|
|System requirements||Internet Connection & Web Browser|
|Email or online ticketing support||Email or online ticketing|
|Support response times||We have different levels of SLAs for responses depending on business severity. Please see the T&Cs document for more details.|
|User can manage status and priority of support tickets||Yes|
|Online ticketing support accessibility||None or don’t know|
|Phone support availability||24 hours, 7 days a week|
|Web chat support||Web chat|
|Web chat support availability||24 hours, 7 days a week|
|Web chat support accessibility standard||None or don’t know|
|How the web chat support is accessible||WebChat is not the preferred accessible service for IBM. We would recommend email or a support ticket in that case. No testing has been done beyond the web interface for webchat.|
|Web chat accessibility testing||WebChat is not the preferred accessible service for IBM. We would recommend email or a support ticket in that case. No testing has been done beyond the web interface for webchat.|
|Onsite support||Yes, at extra cost|
We have a number of different levels of SLA that cover all levels of operational business requirements.
Severity 1 impact which is a critical business impact or service down has 24x7 coverage and we aim to respond to your enquiry within 1 hour.
Severity 2 impact which has a significant business impact has business hours coverage objectives with a 2 business hour response time.
Severity 3 impact which has a minor business impact has business hours coverage objectives with a 4 business hour response time.
Severity 4 impact which has a minimal business impact has business hours coverage objectives with a 1 business day response time.
|Support available to third parties||Yes|
Onboarding and offboarding
IBM can engage the users in different ways.
A free pre-sales engagement can be held with the client before purchase to help the client understand the product and map out use cases. This is useful for product demonstrations and technical exploration. We have a number of Proof of Technologies and Concepts available for exploration with the client.
After purchase, IBM has a service engagement available that is a paid service that aims to help clients set up their software in both initial configurations and running operations.
|End-of-contract data extraction||
IBM App Connect Professional does not store any data, just configuration for its own connecting flows. No data extraction is required in terms of company owned data.
The flows can be extracted for use in other App Connect Professional work environments but is incompatible with other software solutions not provided by IBM.
An On-Premise install of IBM App Connect Professional will go untouched by IBM and will not be patched or upgraded to newer versions. However, it is still available for the client to use.
The SaaS version of IBM App Connect Professional will terminate at the end of the contract pending renewal. We require a contract in place for the SaaS offering to remain in production.
Using the service
|Web browser interface||Yes|
|Application to install||Yes|
|Compatible operating systems||
|Designed for use on mobile devices||No|
|Accessibility standards||None or don’t know|
|Description of accessibility||App Connect professional is a web GUI based environment. Every effort has been made to ensure that every person can access the GUI however it was not designed with accessible standards in mind due to the nature of the product.|
|Accessibility testing||We have not completed any interface testing with users of assistive technology.|
|Independence of resources||
There are 2 SaaS models. 1) Shared multitenancy model 2) Dedicated runtime model. In Dedicated model, resources are allotted only for 1 particular customer.
The architecture of IBM cloud services maintains logical separation of client data. Internal rules and measures separate data processing, such as inserting, modifying, deleting, and transferring data, according to the contracted purposes.
|Service usage metrics||Yes|
|Reporting types||Real-time dashboards|
|Supplier type||Not a reseller|
|Staff security clearance||Other security clearance|
|Government security clearance||Up to Developed Vetting (DV)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||
|User control over data storage and processing locations||Yes|
|Datacentre security standards||Complies with a recognised standard (for example CSA CCM version 3.0)|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider|
|Protecting data at rest||
|Data sanitisation process||Yes|
|Data sanitisation type||Explicit overwriting of storage before reallocation|
|Equipment disposal approach||Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001|
Data importing and exporting
|Data export approach||Data cannot be exported.|
|Data export formats||Other|
|Other data export formats||Data Cannot be Exported|
|Data import formats||Other|
|Other data import formats||Data cannot be exported|
|Data protection between buyer and supplier networks||
|Other protection between networks||IBM will encrypt content not intended for public or unauthenticated viewing when transferring content over public networks. Further, unless excluded by a TD, IBM will enable use of a cryptographic protocol, such as HTTPS, SFTP, and FTPS, for Client’s secure transfer of content to and from the Cloud Service over public networks.|
|Data protection within supplier network||
Availability and resilience
IBM provides the following availability service level agreement (“SLA”) for the Cloud Service as specified in a PoE. The SLA is not a warranty. The SLA is available only to Client and applies only to use in production environments.
There is compensation available for dropping under a certain availability during a contracted month.
If the service is under 99.5% available during a single contracted month you are entitled to claim 10% of the cost of the service as compensation.
If the service is under 99.0% available during a single contracted month you are entitled to claim 50% of the cost of the service as compensation.
If the service is under 95.0% available during a single contracted month you are entitled to claim 75% of the cost of the service as compensation.
|Approach to resilience||Available at request.|
|Outage reporting||Email alerts are provided.|
Identity and authentication
|User authentication needed||Yes|
|Access restrictions in management interfaces and support channels||IBM maintains individual role-based authorization of privileged accounts that is subject to regular validation. A privileged account is a duly authorized IBM user identity with administrative access to a Cloud Service, including associated infrastructure, networks, systems, applications, databases and file systems.|
|Access restriction testing frequency||At least every 6 months|
|Management access authentication||2-factor authentication|
Audit information for users
|Access to user activity audit information||Users contact the support team to get audit information|
|How long user audit data is stored for||Between 1 month and 6 months|
|Access to supplier activity audit information||Users contact the support team to get audit information|
|How long supplier audit data is stored for||Between 1 month and 6 months|
|How long system logs are stored for||Between 1 month and 6 months|
Standards and certifications
|ISO/IEC 27001 certification||Yes|
|Who accredited the ISO/IEC 27001||Coalfire ISO|
|ISO/IEC 27001 accreditation date||15/04/2016|
|What the ISO/IEC 27001 doesn’t cover||The infrastructure and platform this offering is run on is ISO/IEC 27001 compliant. The current SaaS application is not compliant.|
|ISO 28000:2007 certification||No|
|CSA STAR certification||Yes|
|CSA STAR accreditation date||20/04/2016|
|CSA STAR certification level||Level 1: CSA STAR Self-Assessment|
|What the CSA STAR doesn’t cover||The infrastructure and platform this offering is run on has a CSA STAR Self-Assessment certificate. The SaaS side of this offering currently does not have this. The IBM CSA Star Self-Assessment can be viewed here https://cloudsecurityalliance.org/star-registrant/softlayer/|
|Other security accreditations||No|
|Named board-level person responsible for service security||Yes|
|Security governance accreditation||Yes|
|Security governance standards||ISO/IEC 27001|
|Information security policies and processes||
IBM has an Information Technology (IT) Security policy that establishes the requirements for the protection of IBM's worldwide IT systems and the information assets they contain, including networks and computing devices such as servers, workstations, host computers, application programs, web services, and telephone systems within the IBM infrastructure. IBM’s IT Security policy is supplemented by standards and guidelines, such as the Security Standards for IBM's Infrastructure, the Security and Use Standards for IBM Employees and the Security Guidelines for Outsourced Business Services. Such are reviewed by a cross-company team led by the IT Risk organization every six months.
IBM has a dedicated Vice President of IT Security who leads a team responsible for IBM's own enterprise data security standards and practices. Responsibility and accountability for executing internal security programs is established through formal documented policies. IBM Services teams also have dedicated executives and teams who are responsible for information and physical security in the delivery of our client services.
|Configuration and change management standard||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Configuration and change management approach||IBM maintains policies and procedures to manage risks associated with the application of changes to its Cloud Services. Prior to implementation, all changes to a Cloud Service, including its systems, networks and underlying components, will be documented in a registered change request that includes a description and reason for the change, implementation details and schedule, a risk statement addressing impact to the Cloud Service and its clients, expected outcome, rollback plan, and documented approval by IBM management or its authorized delegate.|
|Vulnerability management type||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Vulnerability management approach||With each Cloud Service, as applicable and commercially reasonable, IBM will a) perform penetration testing and vulnerability assessments before production release and routinely thereafter, b) enlist a qualified and reputable independent third-party to perform penetration testing and ethical hacking at least annually, c) perform automated management and routine verification of underlying components’ compliance with security configuration requirements, and d) remediate any identified vulnerability or noncompliance with its security configuration requirements based on associated risk, exploitability, and impact. IBM takes reasonable care to avoid Cloud Service disruption when performing its tests, assessments, scans, and execution of remediation activities.|
|Protective monitoring type||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Protective monitoring approach||IBM maintains and follows policies requiring administrative access and activity in its Cloud Services’ computing environments to be logged and monitored, and the logs to be archived and retained in compliance with IBM’s worldwide records management plan. IBM monitors privileged account use and maintain security information and event management policies and measures designed to a) identify unauthorized administrative access and activity, b) facilitate a timely and appropriate response, and c) enable internal and independent third party audits of compliance with such policies. IBM systematically monitors the health and availability of production Cloud Service systems and infrastructure at all times.|
|Incident management type||Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402|
|Incident management approach||
-maintains and follows incident response policies aligned with NIST guidelines for computer security incident handling, and will comply with data breach notification requirements under applicable law.
-investigates security incidents, including unauthorised access or use of content or the Cloud Service, of which IBM becomes aware, and, if warranted, define and execute an appropriate response plan.
-promptly notifies Client upon determining that a security incident known or reasonably suspected by IBM to affect Client has occurred.
-provides Client with reasonably requested information about such security incident and status of applicable remediation and restoration activities performed or directed by IBM.
|Approach to secure software development best practice||Supplier-defined process|
Public sector networks
|Connection to public sector networks||No|
|Price||£549 per instance per month|
|Discount for educational organisations||No|
|Free trial available||Yes|
|Description of free trial||
30 day free trial, which can then be converted to paid version.
You can access the trail service here:
|Pricing document||View uploaded document|
|Service definition document||View uploaded document|
|Terms and conditions document||View uploaded document|