Automation Consultants

Service Discovery and Latency Modelling Tool

Automation Consultants’ OpsWave is a software suite of data centre migration tools created to make awkward, large-scale IT change simpler and more intuitive. Its features employ intelligent assessment of network trace data to resolve problems commonly associated with data centre migrations.


  • OpsWave shows geographical locations where applications will be most efficient
  • OpsWave removes pains of incomplete application interface documentation
  • Opswave shows application server locations, configurations and associations
  • OpsWave discovers application interdependencies, identifies network traffic between devices
  • OpsWave helps with firewall configurations
  • OpsWave enables users to predict and assess latency issues
  • OpsWave provides user identification on applications


  • OpsWave cuts IT expenditure on costly test equipment
  • OpsWave reduces time spent on application migration testing
  • OpsWave limits downtime
  • Agentless. No risks or potential operational costs associated with agents
  • OpsWave removes pains of incomplete application interface documentation
  • Latency predictions prevent disruption before it becomes an issue
  • Inbuilt automated diagnostic tool capable of anticipating issues


£10 per virtual machine per day

Service documents

G-Cloud 9


Automation Consultants

Jeff Cunliffe


Service scope

Service scope
Software add-on or extension No
Cloud deployment model Private cloud
Service constraints None
System requirements Web server and database server

User support

User support
Email or online ticketing support Yes, at extra cost
Support response times We aim for a sub-1-hour response time during the working week and at weekends.
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), 7 days a week
Web chat support No
Onsite support Yes, at extra cost
Support levels Gold, Silver and Bronze levels of support
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started TestWave has an easy to use interface that users can get the hang of almost immediately. However, if required Automation Consultants can provide further consultancy or training to make sure customers get up and running as effectively as possible.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction AC will provide a CSV file containing all customer data.
End-of-contract process A csv file containing all customer data will be provided on request at the end of the service. Any additional activities required of Automation Consultants may be charged for.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10+
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices No
Accessibility standards None or don’t know
Description of accessibility The service is accessed via a browser which launches a Java applet. The applet is structured like a conventional GUI application with standard GUI objects such as fields, menus and buttons, following de facto industry standards.
Accessibility testing None.
What users can and can't do using the API The application exposes a REST API. The documentation to the API is held by Automation Consultants and made available to suitable requestors. The API permits most operations available through the user interface.
API documentation Yes
API documentation formats Other
API sandbox or test environment No
Customisation available Yes
Description of customisation Defects have a status to reflect the stage to which their handling has progressed, such as ‘New’, ‘Fixed’ or ‘Closed’. The available status may be customised to reflect the desired workflow. Defect fields may be also customised. New user-defined fields may be added and made compulsory as required.
A wide range of privileges can be granted to TestWave users, allowing fine control over who may do what. Privileges may be assigned, for example, to view and modify Defects and change their status; to view and modify Releases, Requirements and Tests; and to customise and perform administrative tasks.
Custom fields may be added to defects and other entities. The user may choose the type and name of any custom field created, and the custom fields may be included in reports and searches.


Independence of resources Automation Consultants monitors resource utilisation on its servers. If resources are close to maximum utilisation, the resources are increased. Slow performance due to unmet resource requirements stemming from volume of utilisation has not been a problem to date.


Service usage metrics No


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Supplier-defined controls
Penetration testing frequency Less than once a year
Penetration testing approach In-house
Protecting data at rest
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
  • Other
Other data at rest protection approach All data stored within encrypted SAN. Access to production servers and data store limited to core team.
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach User may export any TestWave report in CSV format, which can readily be imported to a wide range of other tools. Reports may also be produced in viewer friendly formats such as HTML. On request, a CSV report of an entire TestWave instance may be produced.
Data export formats
  • CSV
  • Other
Other data export formats HTML
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Other
Other protection within supplier network Controlled access to data network

Availability and resilience

Availability and resilience
Guaranteed availability Typical uptime is 99.9%. There are no set compensation arrangements for outages.
Approach to resilience Twin application and database layer nodes. Virtual Machines running within a high availability virtualisation solution. Offsite backup in case of disaster.
Outage reporting Public dashboard and client alerting available. All applications systems have monitoring in place with alerts passed automatically to AC staff.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • Username or password
  • Other
Other user authentication VPN or IP filtering available
Access restrictions in management interfaces and support channels At an application level, privileged access is allowed to users who are designated as managers on particular projects. For access to infrastructure level settings, access is restricted to a small number of named individuals. Two-factor authentication is required to access these resources.
Access restriction testing frequency At least every 6 months
Management access authentication 2-factor authentication

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security accreditations Yes
Any other security accreditations Credit card transactions are performed via Stripe

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance accreditation No
Security governance approach The Chief Technology Officer, reporting to the board, co-ordinates security. Security decisions are taken by the CTO in consultation with the board.
Information security policies and processes A set of security policies documented internally is followed, based on industry best practice. The policy is administered day to day by the CTO. Major decisions are taken by the CTO in consultation with the board.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Major changes must be approved by the board and documented. All changes are reviewed for security among other factors. The application documentation is used to track components through their lifetime.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Threats are assessed by internal analysis and by monitoring user feedback. So far no vulnerabilities have been reported by users.
Patches are deployed overnight if it is considered by the board that there is a security vulnerability to be fixed.
Protective monitoring type Supplier-defined controls
Protective monitoring approach Monitoring for potential compromises is performed through logs and alerts. On finding a potential compromise, the evidence is assessed by the CTO and other relevant staff to determine whether a compromise really occurred or not. If a potential security compromise is identified, A patch is normally put in place within 24 hours.
Incident management type Supplier-defined controls
Incident management approach A common process is followed for most events. Users may report incidents by email, telephone or the company's JIRA-based service desk. Incident reports are provided ad hoc and on demand.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No


Price £10 per virtual machine per day
Discount for educational organisations No
Free trial available No


Pricing document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑