Micro Focus (Entcorp)

Network Operations Management - from Micro Focus

The Network Operations Management (NOM) suite provides market leading management for enterprise networks, across public, managed and private clouds, integrating capabilities to monitor fault, performance, configuration, and compliance of physical, virtual, and software defined network (SDN) infrastructure. The Suite has the broadest and deepest multi-vendor support beyond simple SNMP/ICMP monitoring.


  • Network Fault Management
  • Network Performance Management
  • Network Configuration Management
  • Configuration Audit
  • Configuration Policy Audit
  • Network Auditing and Reporting
  • On Demand Network Notification


  • Publish configuration from multiple devices
  • Allow network audit on mass
  • Enable configuration changes on mass
  • Enable network reporting from data source
  • Enable secure network access
  • Enable network policy compliance
  • Identify change type and change originator
  • Identify network fault on failure
  • Identify network fault on performance
  • identify network fault on configurtion


£751.50 to £3822 per unit per year

  • Free trial available

Service documents

G-Cloud 10


Micro Focus (Entcorp)

Malcolm Gardner (for Micro Focus Government Team)



Service scope

Service scope
Software add-on or extension No
Cloud deployment model Hybrid cloud
Service constraints None
System requirements Node license required

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Severity 1 - 1 Hour
Severity 2 - 3 Hours
Severity 3 - 6 Hours
Severity 4 - 1 Business Day
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support Web chat
Web chat support availability 24 hours, 7 days a week
Web chat support accessibility standard None or don’t know
How the web chat support is accessible Window available on Software Support Online (SSO) website.
Non technical staff available to log or manage calls
Web chat accessibility testing None
Onsite support Yes, at extra cost
Support levels Standard support 24 x 7
FlexCare support available at additional cost. This can be used to align additional resources such as a Technical Account Manager, Named Advance Support Engineer or pre-paid points to provide additional onsite or remote support
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Onsite or online training is available for the solution and a full set of documentation is provided with an online Help Center. Online training is provided by the Microfocus ART product, available also on G-cloud.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction Facilities are provided to allow export of data from the application. The exact requirements for data extraction at the end of the service contract will be negotiated between the customer and the chosen hosting partner.
End-of-contract process This will be negotiated between the customer and hosting partner as part of the service scoping exercise.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Administration only from desktop device
Accessibility standards None or don’t know
Description of accessibility Text and diagram scaling
Accessibility testing Tested with visually impaired
What users can and can't do using the API Users have full published API call's enabling them to complete all task's needed via the API, including but not limited to:
Adding Device, Deleting Devices, Changing config, Changing application behaviour, and running all reports.
API documentation Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
  • PDF
API sandbox or test environment Yes
Customisation available Yes
Description of customisation Administrator can customise the service via API to enable custom polling and configuration per customer and security zone


Independence of resources The solution is scale-able. A scoping exercise between the customer and chosen hosting partner will identify the different workloads over time and required resources required to support those workloads.


Service usage metrics Yes
Metrics types Device count
Device type
User access
Fault audit
Fault access
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Staff screening not performed
Government security clearance None

Asset protection

Asset protection
Knowledge of data storage and processing locations No
Datacentre security standards Managed by a third party
Penetration testing frequency Never
Protecting data at rest Other
Other data at rest protection approach This will be a service provided by the chosen hosting partner.
Data sanitisation process No
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach Data dump from database - command line application provided
API call to database to export data to a pre-defined formate (json, csv)
Data export formats
  • CSV
  • Other
Other data export formats JSON
Data import formats
  • CSV
  • Other
Other data import formats JSON

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks Other
Other protection between networks Data Protection between networks will be discussed and provided by the customer's chosen hosting partner.
Data protection within supplier network Other
Other protection within supplier network This is for discussion between the customer and chosen hosting partner.

Availability and resilience

Availability and resilience
Guaranteed availability This guarantee will be negotiated between the customer and chosen hosting service delivery partner.
Approach to resilience Service resilience will be negotiated between the customer and chosen hosting service delivery partner.
Outage reporting Outage reporting will be provided by the chosen hosting partner..

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password
  • Other
Other user authentication LDAP/AD
Access restrictions in management interfaces and support channels Administration access has no access to customer data and is segregated in database
Access restriction testing frequency At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
  • Other

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 BSI
ISO/IEC 27001 accreditation date 22/05/2017
What the ISO/IEC 27001 doesn’t cover This certifications is for Software support services.
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach Security Governance will be a topic to be covered by the chosen hosting supplier.
Information security policies and processes Security policies and processes will be a topic for discussion with the chosen hosting partner.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach These facilities will be provided by the chosen hosting partner.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Vulnerability management will be provided by the chosen hosting partner.
Protective monitoring type Supplier-defined controls
Protective monitoring approach These facilities will be provided by the chosen hosting partner.
Incident management type Supplier-defined controls
Incident management approach The incident management process will be provided by the chosen hosting partner.

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Public sector networks
Connection to public sector networks No


Price £751.50 to £3822 per unit per year
Discount for educational organisations No
Free trial available Yes
Description of free trial Included
Software license for Evaluation (Non production) use.
Post sales technical support service.
Standard is a maximum of 3 months although extensions to the 3 month period may be granted by the local account team.


Pricing document View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑