G-Cloud 11 services are suspended on Digital Marketplace

If you have an ongoing procurement on G-Cloud 11, you must complete it by 18 December 2020. Existing contracts with Audacix are still valid.
Audacix

Qsome

Qsome gives you peace of mind by helping you ship bug-free software by exploiting cloud-based automated software testing. Our test automation efforts have helped clients reduce application testing time from 4 weeks to 2 days. Our customers also see an average reduction in bugs in production of 72%.

Features

  • Cross-browser, cross-device and desktop application testing
  • Test analytics
  • Automated software testing
  • Test management
  • Risk-based software testing
  • Video logs and screenshots of automated tests
  • Downloadable PDF reports
  • Defect management
  • Code-less test execution
  • Continuous testing through APIs with CICD pipelines

Benefits

  • Test end-to-end user journeys across multiple applications
  • Test end-to-end user journeys across multiple browsers & devices
  • Two-click test execution
  • Reduce software testing time from weeks to hours
  • Reduce defect leakage (bugs-in-production) by an average of 72%
  • Faster & cheaper maintenance of automated tests
  • Faster bug fixing by using video logs and screenshots

Pricing

£1,296 a licence a month

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at <removed>@67215f23-1e68-41c1-94fa-6d690251eeca.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 11

Service ID

5 4 2 3 7 8 8 3 5 1 2 4 7 1 0

Contact

Audacix <removed>
Telephone: <removed>
Email: <removed>@67215f23-1e68-41c1-94fa-6d690251eeca.com

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Software, mobile app, ERP development and deployment services.
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints
Qsome is used for functional test automation, not for load or performance testing. With the Qsome solution we can provide the cloud-based/on-premise testing tool as well as the services to build and maintain your automated test suite.
System requirements
  • Chrome or Firefox browser
  • Internet access

User support

Email or online ticketing support
Email or online ticketing
Support response times
Within 1 business day for standard support clients.
WIthin 30 minutes for premium support clients.
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Standard support is a feature of all Qsome agreements and includes:
- Email & Slack communication
- 9am to 5pm BST on Monday to Friday, excluding public holidays
- Responses within 1 business day

Premium support incurs an additional cost of approximately £2697 per month and includes:
- Support provided through email, Slack, phone & video conferencing
- 3 offshore person days per monthly billing cycle to maintain automated scripts (cannot be used for new scripts, datasets or models)
- Support available 9am to 5pm BST on Monday to Friday, excluding public holidays
- Triage within 60 mins during business hours
- Prioritised implementation within next sprint, if possible, for new feature requests
- Customer success manager
Support available to third parties
Yes

Onboarding and offboarding

Getting started
On-site training, online training videos and user documentation, training through video conferencing.
Service documentation
Yes
Documentation formats
HTML
End-of-contract data extraction
By downloading the java-based test automation scripts.
End-of-contract process
All test artefacts created during an agreement term belong to the client. This information is fully accessible for the duration of the agreement and for up to 14 days after the agreement ends. There is no additional cost to accessing this information.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
User interface modified for smaller viewports.
Service interface
No
API
Yes
What users can and can't do using the API
APIs to execute tests, retrieve results, check batch status. Users cannot create their own APIs, but such requests are prioritised when mutually agreed with clients.
API documentation
Yes
API documentation formats
PDF
API sandbox or test environment
No
Customisation available
Yes
Description of customisation
Users can decide the number of nodes they wish to deploy and the number of test engineers they require when building and maintaining their automated regression suites.

Scaling

Independence of resources
1. For government clients we use single-tenant environments, so useage by other clients will never affect the performance of other environments.

2. For all our environments, we have load balancing combined with auto-scaling to ensure that performance levels are not impacted by peak loads.

3. We conduct exhaustive performance testing prior to each of our releases to ensure that performance regressions are not introduced with a new release.

Analytics

Service usage metrics
Yes
Metrics types
Number of tests performed, number of defects open, test success rate by age, time taken to run tests + many other analytics
Reporting types
  • Real-time dashboards
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
By downloading java files, PDF files and CSV files.
Data export formats
  • CSV
  • Other
Other data export formats
  • PDF
  • .java
Data import formats
  • CSV
  • Other
Other data import formats
  • PDF
  • MP4

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
We guarantee 99.9% uptime. Users will receive a pro-rata service credit on a monthly basis if this SLA is not achieved for a given month. Our SLA can be viewed in full here: https://www.audacix.com/p/saas-service-level-agreement.html
Approach to resilience
We use AWS and Google Cloud services for our datacentre needs. These providers are considered best-in-class in terms of service resiliency. As far as our application and network is concerned, we maintain best-in-class resilience by combining best practice backup, disaster recovery, traffic routing and application architecture practices to deliver a service that conforms to our stated SLAs.
Outage reporting
Email alerts

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
Access to management interfaces is restricted using strict user role and user access policies as well as whitelisting of approved email domains. These controls are tested for vulnerabilities during each external penetration test.

Access to support channels is restricted by username and password mechanisms as well as whitelisting of approved email domains.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Between 6 months and 12 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
Between 6 months and 12 months
How long system logs are stored for
Between 6 months and 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
Yes
CSA STAR accreditation date
30/04/2019
CSA STAR certification level
Level 1: CSA STAR Self-Assessment
What the CSA STAR doesn’t cover
N/A
PCI certification
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
CSA CCM version 3.0
Information security policies and processes
We follow documented information security policies that comply with ISO27001. The Board of Directors give overall strategic direction by approving and mandating the information security principles but delegate operational responsibilities for physical and information security to the CEO and chief architect. These principles and policies are reviewed at least annually.

Our CEO and chief architect are responsible for coordinating and directing our security framework, including the information security controls.

Our managers have KPIs to ensure the day-to-day implementation of the information security policy manual and ensuring that suitable technical, physical and procedural controls are in place in accordance with the manual, and are properly applied and used by all workers.

All team members are responsible for complying with the principles and policies in the information security policy manual, where relevant to their jobs. They are responsible for maintaining the security of all information entrusted to them. Each worker, as a condition of employment, undertakes to comply with our information security policies. Any worker failing to comply with the security policies could be subject to disciplinary action, potentially including termination of employment or contract and/or prosecution.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
We have adopted and implement lean change management processes that strike an effective balance between speed and flexibility. All changes to our application are submitted, amended, discussed, approved and implemented using our various development management tools.

Our configuration management process follows a similar path but allow for more consultation with our client base, where the configuration change is the result of client feedback.

All changes made to our software products are assessed for security risks starting from the design phase, through to delivery. Our security policies are detailed here: https://www.audacix.com/p/security-practices.html
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
We conduct regular vulnerability assessments, internal penetration testing and external penetration testing using accredited partners. Vulnerability assessments start from the design phase where our team assesses potential threats of new or amended features.

Critical patches are deployed at the earliest, usually within a few hours, depending on the scope of the change. Non-critical patches are deployed with the next release at the end of the current sprint.

Our development team and internal security team constantly monitors vulnerability databases for those relevant to our tech stack. We also receive up-to-date information from our external security partners.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
We use enterprise-grade SIEM tools for protective monitoring of our cloud and application environment. Our security policy details steps that our teams undertake to triage, quantify, isolate and remedy potential compromises.

Our security policies require us to prioritise the patching of security vulnerabilities. Generally, critical vulnerabilities are patched within hours, depending on the scope of the vulnerability and the patch.

Automated alerts allow us to respond to critical alerts within 30 minutes.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
In the event of a security breach, we will promptly notify you of any unauthorised access to your data. We have incident management policies and procedures in place to handle such an event and all our team members are trained in how to handle such breaches.

Further, in the event of a breach our processes dictate that all internal and externally contracted subject matter experts will be mobilised to triage the breach, help patch affected areas and work with our teams to ensure that the probability of future breaches is minimised.

Users can report incidents to us by emailing security@audacix.com

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Pricing

Price
£1,296 a licence a month
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
The free trial period is a proof-of-concept period. During this time you can experience the benefits of our Qsome test automation solution as it is used to test your software. We offer both the Qsome testing tool & our test automation services during this PoC.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at <removed>@67215f23-1e68-41c1-94fa-6d690251eeca.com. Tell them what format you need. It will help if you say what assistive technology you use.