Infuse Consulting LTD

Performance Engineering powered by LoadRunner in the G-Cloud

Performance Engineering powered by LoadRunner in the G-Cloud is a remote and onsite delivered engagement which provides a managed environment of a performance engineering platform combined with a very flexible service model that includes options for platform service, turnkey scripting and load testing service.

Features

  • Pay-as-you-go fee structure
  • 24x7x365 availability
  • On-going onsite and remote mentoring
  • Scalable environments capable of generating global scale loads
  • Built-in high availability, redundancy, and failover‑supporting infrastructure
  • Minimize hardware and software investments
  • Supports testing across over 60 protocols
  • Broad set of 3rd party integrations
  • Certified for the information security standard ISO/IEC 27001
  • IL3 compliant and non IL3 compliant available

Benefits

  • No upfront capital outlay for software or hardware
  • Save 15% on testing headcount costs for reporting
  • Pay as you go enterprise level performance engineering

Pricing

£5 to £266 per user

  • Free trial available

Service documents

G-Cloud 11

671662939717642

Infuse Consulting LTD

Ade Odumosu

07788 393923

_sales@infuse.it

Service scope

Service scope
Software add-on or extension Yes, but can also be used as a standalone service
What software services is the service an extension to LR Scripts can be executed from other cloud solutions such as StormRunner.

Scripts and Scenarios can also be executed by Continuous Integration Tools such as Jenkins and Hudson.
Cloud deployment model Public cloud
Service constraints Please refer to the Scheduled Maintenance Feature of the Operational Services Section within the Service Definition document which is downloadable below.
System requirements
  • Remote Desktop connection, port access required
  • Local download of Script Generator possible
  • Local download of Analysis and Reporting tool possible

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Typical response times are 4 hours
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels Support is detailed in the Response and Resolution Targets section of the Service Definition document available below. Support is controlled by dedicated Support Operation Center, Members of the SOC can provide 1st and 2nd line support by guidance and/or physical intervention. SOC has direct access to server and the ability to start and stop service as required. 3rd line support available via HPE, however SOC will mange calls. A Technical Account Manager will be provided as part of the support agreement and will meet regularly to discuss progress and provide a point of contact if there are issues with the SOC.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Please refer to the On Boarding Process Section within the Service Definition document which is downloadable below.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction Please refer to the Off Boarding Process Section within the Service Definition document which is downloadable below.
End-of-contract process On completion of the engagement all scripts, scenarios, results and analysis files and reports will be archived, downloaded and made available to the customer

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
Application to install Yes
Compatible operating systems
  • Android
  • IOS
  • Linux or Unix
  • MacOS
  • Windows
  • Windows Phone
  • Other
Designed for use on mobile devices Yes
Differences between the mobile and desktop service There is no difference, the service is accessed using Remote Desktop Services
Service interface No
API No
Customisation available No

Scaling

Scaling
Independence of resources All tiers of the SaaS infrastructure are proactively monitored for capacity and performance. The architecture allows for addition of capacity to applications, databases and storage.
As a part of Infuse LR on SaaS service customers are allocated with a maximum 1 TB of storage and any attachment file should not exceed 2 GB of size. Customer Infuse LR SaaS environment project capacity is based on the number of concurrent HPE LR users.

Analytics

Analytics
Service usage metrics Yes
Metrics types Infuse will provide monitoring of the SaaS 24/7 using system monitors for availability.
Reporting types Reports on request

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations Yes
Datacentre security standards Managed by a third party
Penetration testing frequency At least once a year
Penetration testing approach ‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest Other
Other data at rest protection approach CPA Foundation-grade assured components
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach Test Artefacts are exported within compressed file folders.
Data export formats Other
Other data export formats WinZip
Data import formats Other
Other data import formats WinZip

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Availability and resilience
Guaranteed availability Availability is 24x7 except for scheduled service outage/upgrade.
Approach to resilience Cloud architecture is managed by third party, SLAs are in place to ensure site is resilient, back-ups are captured daily and rollbacks, restores and migration to alternate servers will be undertaken in event of failure.
Outage reporting Email to affected users

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Username or password
Access restrictions in management interfaces and support channels Server access limited to support staff. Projects have varying level of user privileges, controlled by central administrator.
Access restriction testing frequency At least every 6 months
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information You control when users can access audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information You control when users can access audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 DNV GL - Business Assurance
ISO/IEC 27001 accreditation date 24/09/2015
What the ISO/IEC 27001 doesn’t cover Any items requiring Cryptographic controls as they are not in use.
Outsourced development- there is no outsourced development.
System security testing - No security functionality in product.
Secure development policy - All aspects controlled through internal process.
Secure system engineering principles - All aspects controlled through internal process.
Capacity management - not required due to size of company.
ISO 28000:2007 certification No
CSA STAR certification Yes
CSA STAR accreditation date 25/10/2013
CSA STAR certification level Level 3: CSA STAR Certification
What the CSA STAR doesn’t cover Supplier Defined
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes Infuse follows ISO/IEC 27001. We have Board reviews and walk through's of the policies and processes as well as inducting all staff in the policy. Infuse has an annual external audit of its processes and policies. The Infuse Technical Account Manager is responsible for the policy and reports to the Infuse CEO.

Operational security

Operational security
Configuration and change management standard Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach Change will only occur once a significant version change has been released. The new version will then be been reviewed to check impact that may occur. Change will then be enacted once agreement and time has been arranged. In most cases dedicated timings and duration for the upgrades and general maintenance will be detailed in a Service Definition sheet and agreed by all parties prior to commencement of any changes
Vulnerability management type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach Please refer to the Security and Audit Management Feature of the Operational Services Section within the Service Definition document which is downloadable below.
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach Please refer to the Security and Audit Management Feature of the Operational Services Section within the Service Definition document which is downloadable below.
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach Please refer to the Service Monitoring Feature of the Operational Services Section within the Service Definition document which is downloadable below.

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £5 to £266 per user
Discount for educational organisations No
Free trial available Yes
Description of free trial Infuse allows a full production trial of the tools subject to qualification for up to 30-days.

Contact us and we will deploy an instance for your trial

Service documents

pdf document: Pricing document pdf document: Skills Framework for the Information Age rate card pdf document: Service definition document pdf document: Terms and conditions
Service documents
Return to top ↑