Assure APM Limited

Assure APM

Assure APM design, monitor and manage the IT estate and incorprates.
End User Experience Monitoring Software
Segmentation Security Software – Zero-Trust
Application Intelligence forensics Software
Network Performance Monitoring Technology and Software
The elements above can be provided individually or in any mix.


  • Applications Intelligence performance analysis
  • Provides performance audit trail
  • Rapid deployment saving time and resources
  • Automatic fault isolation and identification processes
  • Integrates with service Desks
  • Application Performance Insights
  • User Experience and Business Insights
  • Asset optimsation through automatic discovery and resource consumption analysis
  • User Experience and Business Insights
  • Cloud-Native Ecosystem Visibility


  • Derive maximum benefit from application deployment
  • Achieve optimum end user performance and productivity
  • Maximise end user satisfaction
  • Substantially reduce average fail to fix times
  • Metrics help remove unnecessary spend on hardware and software
  • Reduce management overhead resources
  • Derive maximum cost benefit


£100.00 to £500,000.00 a user a year

  • Free trial available

Service documents


G-Cloud 12

Service ID

6 3 2 2 0 8 9 3 6 0 8 8 0 6 7


Assure APM Limited Doug More
Telephone: 07815 928525

Service scope

Service constraints
System requirements
No system requirements for cloud deployment

User support

Email or online ticketing support
Email or online ticketing
Support response times
Between 24 hours 9 -5 up to 4 Hours 24/7/365
User can manage status and priority of support tickets
Online ticketing support accessibility
None or don’t know
Phone support
Phone support availability
24 hours, 7 days a week
Web chat support
Onsite support
Yes, at extra cost
Support levels
We provide support 24/7/365 through our partner in the USA. We provide local technical account management 9- 5 Monday - Friday
Support available to third parties

Onboarding and offboarding

Getting started
A welcome email is sent then a kick-off meeting is arranged. The deployment is then planned. If training is then required , we provide training onsite or online and provide training either through our team or through our US Partners which is conducted by an authorised trainer. The entire process is managed by a technical account manager who will be assigned to the project.
Service documentation
Documentation formats
  • HTML
  • ODF
  • PDF
  • Other
Other documentation formats
End-of-contract data extraction
All user datais accessible an can be converted and stored on the client media of their choice. In the event that said data can only be automatically interrogated by tolls provided in the contract which will have ceased them manual interrogation by the client will be required.
End-of-contract process
When the contract is ceased all data held by AssureAPM or our partners will be provided to the client in any standard form requested by the client. This data will then be destroyed in the host instance and if necessary, a 3rd party destruction certificate will be issued. Alternatively, it is possible that the hardware drives holding the said information can be provided to the client for self-destruction or storage.

Using the service

Web browser interface
Using the web interface
Authorised users can monitor but not effect any change.
Administrative users are authorised to make changes.
Web interface accessibility standard
None or don’t know
How the web interface is accessible
Via any unrestricted browser.

Authorised users can monitor but not effect any change.
Administrative users are authorised to make changes.
Web interface accessibility testing
None, this is a bespoke requirement
What users can and can't do using the API
Our Advanced Segmentation and End User Experience solutions provide APIs that can be used to programmatically interact with the services.
API automation tools
  • Ansible
  • Chef
  • Puppet
API documentation
API documentation formats
  • HTML
  • PDF
Command line interface
Command line interface compatibility
  • Linux or Unix
  • Windows
  • MacOS
Using the command line interface
Authorised users can monitor but not effect any change.
Administrative users are authorised to make changes.


Scaling available
Independence of resources
The service we provide is independent of all user resources. It is a monitoring and management service analysing the performance a security of client resources.
Usage notifications
Usage reporting
  • API
  • Other


Infrastructure or application metrics
Metrics types
  • CPU
  • Disk
  • HTTP request and response status
  • Memory
  • Network
  • Number of active instances
  • Other
Other metrics
  • Application Code response times
  • End to end response times
  • Applications response times
  • End user performance metrics
  • End user local applications metrics
  • Network response times
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type
Reseller providing extra support
Organisation whose services are being resold
Aternity, Riverbed, Illumio, Arbor

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • EU-US Privacy Shield agreement locations
User control over data storage and processing locations
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
Protecting data at rest
  • Encryption of all physical media
  • Other
Other data at rest protection approach
Physical data stored within our public cloud infrastructure is subject to the data centre physical control sets deployed by our public cloud suppliers. Data held on Assure APM assets is protected using encryption (Bitlocker, FileVault, LUKS/encryptfs).
Data sanitisation process
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Hardware containing data is completely destroyed
Equipment disposal approach
A third-party destruction service

Backup and recovery

Backup and recovery
What’s backed up
All applications performance data and analytics
Backup controls
Users can backup and restore chosen data. It is also standard that a substantial amount of data would be purged.Backups are scheduled by the client through a standard web browser. It is important to understand that the Network, End User experience and Applications tools are all available to control, manage and backup from a central portal interface will be provided to the client. The Security element also has its own individual portal provided to the client for all functions including backup.
Datacentre setup
Multiple datacentres with disaster recovery
Scheduling backups
Users schedule backups through a web interface
Backup recovery
Users can recover backups themselves, for example through a web interface

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Other
Other protection between networks
All communications between the client's infrastructure and our services uses standard encryption mechanisms to protect data in transit, such as TLS and IPSec.
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
Users have access to our cloud services which we offer on a 23/7/365 basis. Outages can be caused by a number of extraneous factor out with our control, for example client network issues. We therefore do not offer refunds or availability guarantees.
Approach to resilience
All our services other than bespoke on-premises are delivered across a multi cloud operation with asset protection in place.
Outage reporting
The client is provided with portal or management station which will provide real time alerts for outages or any breach of service. Thresholds can be user defined utilising the portal or management station.

Identity and authentication

User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google apps)
  • Username or password
Access restrictions in management interfaces and support channels
All solutions include the capability to define Role Based Access Control (RBAC) to ensure separation of duties within the administrative functions of provided solutions. Support channel access controls are handled by our technology partners.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Devices users manage the service through
  • Dedicated device on a segregated network (providers own provision)
  • Dedicated device on a government network (for example PSN)
  • Dedicated device over multiple services or networks
  • Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)
  • Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
How long system logs are stored for

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications
Any other security certifications
Cyber Essentials

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
Assure APM has appointed a CISO who sits on the board as a company director. It is the CISO's responsibility to maintain Assure APM's suite of policy documentation and provide updates to the ISMS as part of Assure APM's commitment to continuous improvement with regard to security.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
On-premises deployments are deployed in manner that is compliant with the client's configuration management standards and processes, including integration with automated tooling as required. SaaS deployments rely on our technolgy partners' configuration management processes. These ensure that system components are tracked and monitored throughout their operational lifetimes.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Assure APM's technology partners supply vulnerability data regarding their products and suggested mitigations, such as reconfigurations and updates. Assure APM also monitors open source vulnerability data feeds with a focus on the specific platforms that we deploy.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Protective monitoring of on-premises deployments is subject to the client's requirements. AssureAPM's solutions can be deployed in line with these requirements to deliver effective operational monitoring.

SaaS deployments can also be integrated with client monitoring systems to deliver operational monitoring.
Incident management type
Incident management approach
With each of our technology partners we support incident logging via the web on a 24/7/365 basis. A call ticket is issued and the appropriate SLA clock begins ticking. Where a security incident has been declared, reports are made available to clients at regular intervals during the incident remediation process.

Secure development

Approach to secure software development best practice
Supplier-defined process

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart

Energy efficiency

Energy-efficient datacentres
Description of energy efficient datacentres
Our Cloud partners partially deploy their servers in energy efficient data centres


£100.00 to £500,000.00 a user a year
Discount for educational organisations
Free trial available
Description of free trial
Limited version of end user experience and segmentation security software. Neuter of the trails can be deployed in enforcement mode functionality is purely monitoring. Applications Intelligence and Network performance technology is not available for trial demo only.

Service documents