Software AG (UK) Limited

Software AG - webMethods.io B2B

Exchange your B2B documents in the cloud—and avoid infrastructure headaches and costs. With webMethods.io B2B, built on the industry-leading webMethods Trading Networks, you can transmit business documents—like purchase orders, invoices and shipping notices—electronically with customers, distributors and trading partners without any hardware investment, maintenance or upgrades

Features

  • Partner profile management
  • Partner self-service
  • Automated business partner onboarding
  • Support for all common EDI standards
  • Secure message exchange
  • Integration with business applications
  • Built-in monitoring and alerting

Benefits

  • Single gateway for all business partner exchanges
  • EDI and flat-file-based
  • Bi-directional integration with business partners
  • Integration with business applications
  • Self monitoring

Pricing

£1800 to £25000 per unit per month

Service documents

Framework

G-Cloud 11

Service ID

6 7 4 8 9 4 4 0 4 3 0 3 2 8 0

Contact

Software AG (UK) Limited

Steve McReavy

07584 337122

steve.mcreavy@softwareag.com

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Software AG's webMethods.io B2B works seamlessly with other webMethods.io services: webMethods.io Integration, webMethods.io Cloud Deployment, webMethods.io API Management, webMethods.io AgileApps. It can also be combined with other Software AG Cloud services such as IoT Integration, and Business and IT Transformation.
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints
None - Software AG offers a flexible deployment model that can be suited to the customer requirements. This includes Public, Private or Hybrid cloud deployments using a variety of technologies.
System requirements
System requirements not applicable for managed cloud solutions.

User support

Email or online ticketing support
Email or online ticketing
Support response times
Depends on the level of support
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
With standard support offerings, Software AG provides 4 Support levels termed as Critical Priority, High Priority, Medium Priority and Low Priority - all of which have target response times derailed in the SLA. Standard Support comes with the product for a standard fee. For more tailored support, clients can selects a Managed Service option whereby the SLA’s and response times are configured in accordance with their requests. This service can include aspects such as Technical Account Manager, Capacity Management and any other service the client might want to add. The fee for the managed service is determined by the service required.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Standard Training and Full documentation provided - Training and documentation and video's can also be tailored/ created to meet specific customer requirements. Train the trainer is also available upon request.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Open standard exporting of Data can be provided at Contract end using tooling capability.
End-of-contract process
At end of contract - customer typically decide to continue with the service. Alternatively they can choose to export the data for example to another Service Provider. Software Ag is happy to assist with this process.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
Application to install
No
Designed for use on mobile devices
No
Service interface
Yes
Description of service interface
Web-based user interface for tenant (account) management and B2B development. The solution has been assessed against the German BTIV 2.0 regulation designed on top of the WCAG 2.0 standard.
Accessibility standards
None or don’t know
Description of accessibility
The solution has been assessed against the German BTIV 2.0 regulation designed on top of the WCAG 2.0 standard.
Accessibility testing
The solution has been assessed against the German BTIV 2.0 regulation designed on top of the WCAG 2.0 standard.
API
No
Customisation available
No

Scaling

Independence of resources
Scoping and on-boarding processes define the optimum specification for the customers requirements. The required amount of computer capacity is assigned to the customer. software AG technology is fully equipped to leverage via AWS scalable hosting

Analytics

Service usage metrics
Yes
Metrics types
Self monitoring of SLAs and KPIs such as:
- Volume of business activity and its responsiveness
- Serious errors that might have occurred
- Other key performance indicators (KPIs)
Rules can be established as well as actions (notifications and/or sevice calls) to be taken when violated. KPIs can be shown on dashboards.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
No
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Encryption of all physical media
Data sanitisation process
No
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Exporting of Data can be achieved using open standards formats
Data export formats
Other
Other data export formats
XML
Data import formats
Other
Other data import formats
XML

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
99.99, assured by contractual commitment
Approach to resilience
Software AG’s cloud services provide 99.95% infrastructure availability (over AWS) and 99.5% availability for the solution itself.
Outage reporting
Software AG’s Cloud Trust Centre website provides web-based access to • Live data on our cloud system availability • Current and historical information on system performance

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
Authentication is required and is implemented access cloud accounts and account activities are logged using AWS Cloud Trail services. In addition, The cloud product permits the configuration of a connection to customer's Single Sign On Services through an Identity Federation Capability via SAML2. In addition, the AWS Identity and Access Management (IAM) service provides identity federation to the AWS Management Console. Multi-factor authentication is an optional feature that a customer can utilize. A certification based authentication is not required.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users receive audit information on a regular basis
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users receive audit information on a regular basis
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
Yes
Any other security certifications
Compliant with customers private cloud secuity arrangements

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Security testing and policies (SOC) Type II, independent third-party auditor certification AICPA Trust Services Implement and maintain a standards based ISMS Comply with (IaaS) provider, Amazon Web Services security policy Cloud Security Alliance (CSA) CSA Consensus Assessment Initiative Questionnaire (CAIQ) Security testing type Penetration testing IT Health Checks Risk analysis Other

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Behind the scenes, Software AG’s Cloud Service Operations team manages our cloud offerings so the customer doesn't have to. The standard included services are: • Regular upgrades to latest software versions (following product release cycle) • Seamless patching during maintenance windows to minimize vulnerabilities or bug impact • Performance monitoring • Service continuity and recovery procedures for high up-time
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Software AG’s Cloud Service Operations team carries out Seamless patching during maintenance windows to minimize vulnerabilities or bug impact
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Our auditor’s SOC 2 Type II report certifies the operational effectiveness of our systems that keep your sensitive data secure. This provides a high level of transparency into our controls that mitigate operational and compliance risks. Because it requires an attestation by an independent and objective CPA who bears professional liability for his or her opinion, the SOC 2 is more stringent and credible than other types of reporting on information security controls.
Incident management type
Undisclosed
Incident management approach
Our auditor’s SOC 2 Type II report certifies the operational effectiveness of our systems that keep your sensitive data secure. This provides a high level of transparency into our controls that mitigate operational and compliance risks. Because it requires an attestation by an independent and objective CPA who bears professional liability for his or her opinion, the SOC 2 is more stringent and credible than other types of reporting on information security controls.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Pricing

Price
£1800 to £25000 per unit per month
Discount for educational organisations
No
Free trial available
No

Service documents

Return to top ↑