Qsome gives you peace of mind by helping you ship bug-free software by exploiting cloud-based automated software testing. Our test automation efforts have helped clients reduce application testing time from 4 weeks to 2 days. Our customers also see an average reduction in bugs in production of 72%.


  • Cross-browser, cross-device and desktop application testing
  • Test analytics
  • Automated software testing
  • Test management
  • Risk-based software testing
  • Video logs and screenshots of automated tests
  • Downloadable PDF reports
  • Defect management
  • Code-less test execution
  • Continuous testing through APIs with CICD pipelines


  • Test end-to-end user journeys across multiple applications
  • Test end-to-end user journeys across multiple browsers & devices
  • Two-click test execution
  • Reduce software testing time from weeks to hours
  • Reduce defect leakage (bugs-in-production) by an average of 72%
  • Faster & cheaper maintenance of automated tests
  • Faster bug fixing by using video logs and screenshots


£1296 per licence per month

  • Education pricing available
  • Free trial available

Service documents

G-Cloud 11



Ayush Trivedi


Service scope

Service scope
Software add-on or extension Yes, but can also be used as a standalone service
What software services is the service an extension to Software, mobile app, ERP development and deployment services.
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints Qsome is used for functional test automation, not for load or performance testing. With the Qsome solution we can provide the cloud-based/on-premise testing tool as well as the services to build and maintain your automated test suite.
System requirements
  • Chrome or Firefox browser
  • Internet access

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Within 1 business day for standard support clients.
WIthin 30 minutes for premium support clients.
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels Standard support is a feature of all Qsome agreements and includes:
- Email & Slack communication
- 9am to 5pm BST on Monday to Friday, excluding public holidays
- Responses within 1 business day

Premium support incurs an additional cost of approximately £2697 per month and includes:
- Support provided through email, Slack, phone & video conferencing
- 3 offshore person days per monthly billing cycle to maintain automated scripts (cannot be used for new scripts, datasets or models)
- Support available 9am to 5pm BST on Monday to Friday, excluding public holidays
- Triage within 60 mins during business hours
- Prioritised implementation within next sprint, if possible, for new feature requests
- Customer success manager
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started On-site training, online training videos and user documentation, training through video conferencing.
Service documentation Yes
Documentation formats HTML
End-of-contract data extraction By downloading the java-based test automation scripts.
End-of-contract process All test artefacts created during an agreement term belong to the client. This information is fully accessible for the duration of the agreement and for up to 14 days after the agreement ends. There is no additional cost to accessing this information.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service User interface modified for smaller viewports.
Service interface No
What users can and can't do using the API APIs to execute tests, retrieve results, check batch status. Users cannot create their own APIs, but such requests are prioritised when mutually agreed with clients.
API documentation Yes
API documentation formats PDF
API sandbox or test environment No
Customisation available Yes
Description of customisation Users can decide the number of nodes they wish to deploy and the number of test engineers they require when building and maintaining their automated regression suites.


Independence of resources 1. For government clients we use single-tenant environments, so useage by other clients will never affect the performance of other environments.

2. For all our environments, we have load balancing combined with auto-scaling to ensure that performance levels are not impacted by peak loads.

3. We conduct exhaustive performance testing prior to each of our releases to ensure that performance regressions are not introduced with a new release.


Service usage metrics Yes
Metrics types Number of tests performed, number of defects open, test success rate by age, time taken to run tests + many other analytics
Reporting types
  • Real-time dashboards
  • Reports on request


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • Other locations
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least every 6 months
Penetration testing approach ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest Encryption of all physical media
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach By downloading java files, PDF files and CSV files.
Data export formats
  • CSV
  • Other
Other data export formats
  • PDF
  • .java
Data import formats
  • CSV
  • Other
Other data import formats
  • PDF
  • MP4

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability We guarantee 99.9% uptime. Users will receive a pro-rata service credit on a monthly basis if this SLA is not achieved for a given month. Our SLA can be viewed in full here:
Approach to resilience We use AWS and Google Cloud services for our datacentre needs. These providers are considered best-in-class in terms of service resiliency. As far as our application and network is concerned, we maintain best-in-class resilience by combining best practice backup, disaster recovery, traffic routing and application architecture practices to deliver a service that conforms to our stated SLAs.
Outage reporting Email alerts

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels Access to management interfaces is restricted using strict user role and user access policies as well as whitelisting of approved email domains. These controls are tested for vulnerabilities during each external penetration test.

Access to support channels is restricted by username and password mechanisms as well as whitelisting of approved email domains.
Access restriction testing frequency At least every 6 months
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for Between 6 months and 12 months
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for Between 6 months and 12 months
How long system logs are stored for Between 6 months and 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification Yes
CSA STAR accreditation date 30/04/2019
CSA STAR certification level Level 1: CSA STAR Self-Assessment
What the CSA STAR doesn’t cover N/A
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards CSA CCM version 3.0
Information security policies and processes We follow documented information security policies that comply with ISO27001. The Board of Directors give overall strategic direction by approving and mandating the information security principles but delegate operational responsibilities for physical and information security to the CEO and chief architect. These principles and policies are reviewed at least annually.

Our CEO and chief architect are responsible for coordinating and directing our security framework, including the information security controls.

Our managers have KPIs to ensure the day-to-day implementation of the information security policy manual and ensuring that suitable technical, physical and procedural controls are in place in accordance with the manual, and are properly applied and used by all workers.

All team members are responsible for complying with the principles and policies in the information security policy manual, where relevant to their jobs. They are responsible for maintaining the security of all information entrusted to them. Each worker, as a condition of employment, undertakes to comply with our information security policies. Any worker failing to comply with the security policies could be subject to disciplinary action, potentially including termination of employment or contract and/or prosecution.

Operational security

Operational security
Configuration and change management standard Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach We have adopted and implement lean change management processes that strike an effective balance between speed and flexibility. All changes to our application are submitted, amended, discussed, approved and implemented using our various development management tools.

Our configuration management process follows a similar path but allow for more consultation with our client base, where the configuration change is the result of client feedback.

All changes made to our software products are assessed for security risks starting from the design phase, through to delivery. Our security policies are detailed here:
Vulnerability management type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach We conduct regular vulnerability assessments, internal penetration testing and external penetration testing using accredited partners. Vulnerability assessments start from the design phase where our team assesses potential threats of new or amended features.

Critical patches are deployed at the earliest, usually within a few hours, depending on the scope of the change. Non-critical patches are deployed with the next release at the end of the current sprint.

Our development team and internal security team constantly monitors vulnerability databases for those relevant to our tech stack. We also receive up-to-date information from our external security partners.
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach We use enterprise-grade SIEM tools for protective monitoring of our cloud and application environment. Our security policy details steps that our teams undertake to triage, quantify, isolate and remedy potential compromises.

Our security policies require us to prioritise the patching of security vulnerabilities. Generally, critical vulnerabilities are patched within hours, depending on the scope of the vulnerability and the patch.

Automated alerts allow us to respond to critical alerts within 30 minutes.
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach In the event of a security breach, we will promptly notify you of any unauthorised access to your data. We have incident management policies and procedures in place to handle such an event and all our team members are trained in how to handle such breaches.

Further, in the event of a breach our processes dictate that all internal and externally contracted subject matter experts will be mobilised to triage the breach, help patch affected areas and work with our teams to ensure that the probability of future breaches is minimised.

Users can report incidents to us by emailing

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Public sector networks
Connection to public sector networks No


Price £1296 per licence per month
Discount for educational organisations Yes
Free trial available Yes
Description of free trial The free trial period is a proof-of-concept period. During this time you can experience the benefits of our Qsome test automation solution as it is used to test your software. We offer both the Qsome testing tool & our test automation services during this PoC.

Service documents

pdf document: Pricing document pdf document: Terms and conditions
Service documents
Return to top ↑