G-Cloud 11 services are suspended on Digital Marketplace

If you have an ongoing procurement on G-Cloud 11, you must complete it by 18 December 2020. Existing contracts with Infuse Consulting LTD are still valid.
Infuse Consulting LTD

Performance Engineering

Performance Engineering is powered by HPE StormRunner - an enterprise performance engineering service that allows you to deliver the full benefits of modern performance testing on the cloud.

Execute scripts created in Gatling, JMeter and LoadRunner and provide a fully fledged performance testing environment in the cloud.

Features

  • Basic Training - Includes access to on-demand performance engineering training
  • 24x7x365 availability
  • Scalable environments capable of generating global scale loads
  • Offline analysis helps to identify performance issues.
  • Minimize hardware and software investments
  • Integration with open source toolsets
  • Broad set of integrations including Open Source
  • Add-on scripting and test services with professional engineers
  • Integrate with continuous integration

Benefits

  • No upfront capital outlay for software or hardware

Pricing

£3.39 to £202 a unit a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at _sales@infuse.it. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 11

Service ID

6 2 2 3 3 8 6 9 8 0 0 3 1 8 4

Contact

Infuse Consulting LTD Ade Odumosu
Telephone: 07788 393923
Email: _sales@infuse.it

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
StormRunner can be integrated with a variety of HPE such as SiteScope, Network Virtualisation and Mobile Center.

The platform can also be used with a number of Open Source toolsets and is able to run scripts built in Apache Jmeter and Gatling as well as using the Git repository.
Cloud deployment model
Public cloud
Service constraints
Please refer to the Scheduled Maintenance Feature of the Operational Services Section within the Service Definition document which is downloadable below.
System requirements
  • Web browser
  • Local download of Script Generator
  • Local admin access

User support

Email or online ticketing support
Email or online ticketing
Support response times
Support response times

Typical response times are 4 hours
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Support is detailed in the Response and Resolution Targets section of the Service Definition document available below. Support is controlled by dedicated Support Operation Center, Members of the SOC can provide 1st and 2nd line support by guidance and/or physical intervention. SOC has direct access to server and the ability to start and stop service as required. 3rd line support available via Micro focus, however SOC will mange calls. A Technical Account Manager will be provided as part of the support agreement and will meet regularly to discuss progress and provide a point of contact if there are issues with the SOC.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Please refer to the On Boarding Process section within the Service Definition document which is downloadable below.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
All test artefacts (scripts, results, analysis) can be exported.
End-of-contract process
Please refer to the Off Boarding Process section within the Service Definition document which is downloadable below.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
  • Linux or Unix
  • MacOS
  • Windows
  • Windows Phone
  • Other
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
The system will work on mobile but will have limited functionality. It is optimised for desktop web applications.
Service interface
No
API
Yes
What users can and can't do using the API
Our API enables developers to do such actions as login and run a test in StormRunner. The public API is HTTP-based and RESTful. JSON is returned by all API responses. Any changes must be checked and agreed before implementation. If required support staff may complete this, but at extra cost.

ISO/IEC 27001:2005 certified IL3 compliant ITL certification ISAE 3402/SAS 70 type I and II
API documentation
Yes
API documentation formats
  • HTML
  • PDF
API sandbox or test environment
No
Customisation available
Yes
Description of customisation
Dashboards can be customized for view preference

Scaling

Independence of resources
All tiers of the SaaS infrastructure are proactively monitored for capacity and performance. The architecture allows for addition of capacity to applications, databases and storage.
As a part of Infuse StormRunner on SaaS service customers are allocated with a maximum 3 TB of storage and any attachment file should not exceed 2 GB of size. Customer environment project capacity is based on the number of concurrent users.

Analytics

Service usage metrics
Yes
Metrics types
Infuse will provide monitoring of the platform 24/7 using system monitors for availability.
Reporting types
Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
Other
Other data at rest protection approach
CPA Foundation-grade assured components
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Test Artefacts are exported within compressed file folders containing HPE proprietary files.
Data export formats
Other
Other data export formats
WinZip
Data import formats
Other
Other data import formats
WinZip

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
Availability is 24x7 except for scheduled service outage/upgrade.
Approach to resilience
Cloud architecture is managed by third party, SLAs are in place to ensure site is resilient, back-ups are captured daily and rollbacks, restores and migration to alternate servers will be undertaken in event of failure.
Outage reporting
Email to affected users

Identity and authentication

User authentication needed
Yes
User authentication
Username or password
Access restrictions in management interfaces and support channels
Server access limited to support staff. Projects have varying level of user privileges, controlled by central administrator.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Access to user activity audit information
You control when users can access audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
You control when users can access audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
DNV GL - Business Assurance
ISO/IEC 27001 accreditation date
24/09/2015
What the ISO/IEC 27001 doesn’t cover
Any items requiring Cryptographic controls as they are not in use. Outsourced development- there is no outsourced development. System security testing - No security functionality in product. Secure development policy - All aspects controlled through internal process. Secure system engineering principles - All aspects controlled through internal process. Capacity management - not required due to size of company.
ISO 28000:2007 certification
No
CSA STAR certification
Yes
CSA STAR accreditation date
25/10/2013
CSA STAR certification level
Level 3: CSA STAR Certification
What the CSA STAR doesn’t cover
Supplier Defined
PCI certification
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Infuse follows ISO/IEC 27001. We have Board reviews and walk through's of the policies and processes as well as inducting all staff in the policy. Infuse has an annual external audit of its processes and policies. The Infuse Technical Account Manager is responsible for the policy and reports to the Infuse CEO.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Change will only occur once a significant version change from HPE has been released. The new version will then be been reviewed to check impact that may occur. Change will then be enacted o ce agreement and time has been arranged. In most cases dedicated timings and duration for the upgrades and general maintenance will be detailed in a Master Services Agreement agreed by all parties prior to commencement
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Please refer to the Security and Audit Management Feature of the Operational Services Section within the Service Definition document which is downloadable below.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Please refer to the Service Monitoring Feature of the Operational Services Section within the Service Definition document which is downloadable below.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Customers will raise incident vis SOC, this will then have a ticket associated which will be assigned a support engineer who will track and resolve.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Pricing

Price
£3.39 to £202 a unit a year
Discount for educational organisations
No
Free trial available
Yes
Description of free trial
Infuse allows a full production trial of the tools subject to qualification for up to 30-days. Contact us and we will deploy an instance for your trial
Link to free trial
http://www8.hp.com/us/en/software-solutions/stormrunner-load-agile-cloud-testing/try-now.html

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at _sales@infuse.it. Tell them what format you need. It will help if you say what assistive technology you use.