INCESSANT TECHNOLOGIES (UK) LIMITED

Incessant Appian Continuous Delivery (iACD)

iACD is a Continuous Delivery Framework that uses Appian's BPM capabilities to orchestrate and automate the application release process. It brings together a number of the key DevOps processes, specifically: Continuous Integration, Scripted Deployment and the Deployment Pipeline. These DevOps processes enable Continuous Deployment to achieve Continuous Delivery.

Features

  • Pre-Deployment Code quality checks in Development
  • Automated Smoke Testing of the build, prior to deployment
  • Automatic creation of the Build within Development for deployment
  • Automated Deployment of the build to upstream environments using tools
  • Deployment Cross-Check, comparing components in each environment
  • Automated Functional Testing of the build using tools like Selenium

Benefits

  • 20-30% increase in deployment of applications
  • 50% increase in management of multiple deployments
  • End to End release governance process across multiple deployment environments
  • Performs automated smoke testing before and after deployments
  • Introspects build to assess integration points (services) required for simulation
  • Performs full regression tests, where required in each environment
  • Automates quality checks before and after deployment for each build

Pricing

£200 to £900 per person per day

  • Education pricing available

Service documents

G-Cloud 9

628435439519731

INCESSANT TECHNOLOGIES (UK) LIMITED

Vijay Poondy

+44 743 7466611

ukoffice@incessanttechnologies.com

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Hybrid cloud
Service constraints No
System requirements Appian BPM Platform

User support

User support
Email or online ticketing support Yes, at extra cost
Support response times This is subject to the individual contractual agreements for each engagement.
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support Onsite support
Support levels We provide application support at three levels:
Level1 support :
Level 1 support provides resolution to minor issues within an application

Level2 support:
Level 2 support will provide a secondary resolution function and management of solution configuration

Level3 support:
The Level 3 support will provide advanced technology diagnosis and resolution.

The cost of each level of support is subject to different parameters per contract; e.g. the size of application, the hours of support required etc.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started We provide training both onsite as well as online through channels such as video conferencing. The duration and medium of training is mutually agreed upon.
We also provide user manual as part of our service which details the usage of delivered application for different categories of application users.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction The application provides out of the box data export functionality using which users can filter and export their data in CSV/Excel file formats from the application.
Incessant also provides bulk data extraction service in case required to provide full extract of live as well as historical data from the application into staging database tables or CSV/Excel file formats. This data can then be imported into any other application later on.
End-of-contract process The original contract by default does not include decommissioning of the application. Since the amount of data to be extracted would keep on increasing with time, an assessment is performed to identify the effort required for data extraction and decommissioning once the decision is made to discontinue the usage of the application. Accordingly the cost of extraction and decommissioning is determined.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10+
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install Yes
Compatible operating systems
  • Android
  • IOS
  • Linux or Unix
  • MacOS
  • Windows
  • Windows Phone
Designed for use on mobile devices Yes
Differences between the mobile and desktop service The UI is dynamic and responsive and hence all features available on desktop are also available through mobile.
Accessibility standards WCAG 2.0 AA or EN 301 549
Accessibility testing NA
API Yes
What users can and can't do using the API Users can configure REST and SOAP services through our API. Users can send requests and receive response from through the services configured using our APIs.
API documentation Yes
API documentation formats
  • HTML
  • PDF
API sandbox or test environment Yes
Customisation available Yes
Description of customisation We deliver services on top of a BPM or Case Management Platform which provides a model driven environment for configuration of business processes, rules, user interfaces, SLAs etc. Therefore, all these nuances can be customized by the administrative users who are authorized and trained to perform such customization. Authorized users can customize these through a web based user-friendly interface

Scaling

Scaling
Independence of resources We use standard global cloud services hosting platforms to host our applications which take care of independence of resources in case of concurrent access by multiple users.

Analytics

Analytics
Service usage metrics Yes
Metrics types The application provides out of the box metrics such as Case SLA Adherence, Case Ageing, Pending Case Status, User Performance etc. Besides, users can also configure their own reports in the application as the application provides a simple drag and drop interface for creating reports.
Reporting types
  • Real-time dashboards
  • Regular reports

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • EU-US Privacy Shield agreement locations
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest Encryption of all physical media
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach The application provides out of the box data export functionality using which users can filter and export their data in CSV/Excel file formats from the application.
Data export formats
  • CSV
  • Other
Other data export formats Excel
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability Monthly uptime percentage of 99.95% is the typical SLA adhered to in our service provisions. In the event of Monthly uptime percentage not meeting the SLA during subscription month, a service credit will be provided.
Approach to resilience This information will be available on request.
Outage reporting The outages are reported through dashboards and email alerts.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Username or password
Access restrictions in management interfaces and support channels The access restriction in management portals/interfaces and support channels through Access Groups. Each user is associated to one or more access groups. The access group associated with a user helps in defining the accessibility of the user to different portals within the application. It also determines which roles (such as Management role, Support role) the user can take within the application.
Access restriction testing frequency At least every 6 months
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information You control when users can access audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 TUV
ISO/IEC 27001 accreditation date 09/09/2015
What the ISO/IEC 27001 doesn’t cover This will be available on request.
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification Yes
Who accredited the PCI DSS certification M. Kuppuswamy PSG & Co LLP
PCI DSS accreditation date 27/03/2017
What the PCI DSS doesn’t cover This will be available on request.
Other security accreditations No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance accreditation Yes
Security governance standards ISO/IEC 27001
Information security policies and processes We are certified ISO27001 and PCIDSS. We follow the processes as per these standards.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach This information will be available on request.
Vulnerability management type Undisclosed
Vulnerability management approach We have a documented vulnerability management process. This process is reviewed by an independent third party at least once in a year. The process is aligned as per the requirement of ISO2001 and PCIDSS. Detailed process document will be available on request.
Protective monitoring type Undisclosed
Protective monitoring approach We have a documented protective monitoring process. This process is reviewed by an independent third party at least once in a year. The process is aligned as per the requirement of ISO2001 and PCIDSS. Detailed process document will be available on request.
Incident management type Undisclosed
Incident management approach We have a documented incident management process. This process is reviewed by an independent third party at least once in a year. The process is aligned as per the requirement of ISO2001 and PCIDSS. Detailed process document will be available on request.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £200 to £900 per person per day
Discount for educational organisations Yes
Free trial available No

Documents

Documents
Pricing document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑