Hybrid Network & Infrastructure Performance Monitoring platform for on premise infrastructure and public cloud


  • Real-time monitoring
  • Dashboards and reports
  • Discovery as a service
  • Automation of IT Monitoring Processes
  • Public cloud monitoring
  • Complex application monitoring
  • Topology mapping
  • Hybrid infrastructure monitoring
  • Alerting


  • Reduce systems downtime
  • Facilitate discovery of IT environments
  • Enable cost savings
  • Forecast performance issues
  • Reduce time to resolution for system faults
  • Centralised visibility for complex IT environments


£3 to £16 per device per month

  • Education pricing available
  • Free trial available

Service documents


G-Cloud 11

Service ID

7 6 3 7 2 0 6 2 5 2 3 6 3 3 7



Adam Nash



Service scope

Service scope
Software add-on or extension No
Cloud deployment model Private cloud
Service constraints Requires SNMP/WMI/API/Script access to monitor equipment
System requirements
  • Linux or Windows device to deploy collector
  • Protocol/API access needed to poll performance information

User support

User support
Email or online ticketing support Email or online ticketing
Support response times 5 minutes response time on average, 24/7 support
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support Web chat
Web chat support availability 24 hours, 7 days a week
Web chat support accessibility standard None or don’t know
How the web chat support is accessible Through the portal, within platform
Web chat accessibility testing Unknown
Onsite support Yes, at extra cost
Support levels We have 24/5 and 24/7 support
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started We have a full online training service
We provide in-depth training and guided deployment to all customers
Service documentation Yes
Documentation formats HTML
End-of-contract data extraction Using the API - all data stored in a time series database
End-of-contract process Full support and upgrades to the core product

Additional costs for
-Cloud monitoring
-Config backup
-Complex application monitoring

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Management console available via a web page on a mobile app and optimised for this platform
Service interface Yes
Description of service interface The interface for the service is primarily a management console served via web page. There is also a restful API to control all functionality - any function which can be achieved with the GUI can also be done with the API
Accessibility standards None or don’t know
Description of accessibility N/A
Accessibility testing N/A
What users can and can't do using the API Restful API - you create credentials in the portal, ID and token
API documentation Yes
API documentation formats Open API (also known as Swagger)
API sandbox or test environment No
Customisation available Yes
Description of customisation Anything can be customised
-Monitoring Templates
-Group Architecture
-Rights and permissions


Independence of resources All instances are fully isolated with their own dedicated infrastructure


Service usage metrics Yes
Metrics types Full analysis of your platform and its own performance using the collector we collect data about your environment with - self-monitoring
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • EU-US Privacy Shield agreement locations
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
Data sanitisation process Yes
Data sanitisation type Explicit overwriting of storage before reallocation
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach Using the API
Data export formats
  • CSV
  • Other
Other data export formats
  • PDF
  • HTML
  • JSON
Data import formats
  • CSV
  • Other
Other data import formats JSON

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability 99.9%
Approach to resilience Available on request
Outage reporting A public dashboard, email alerts

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Username or password
  • Other
Other user authentication SAML - 2-factor authentication with a customer's existing 2-factor security solution
Access restrictions in management interfaces and support channels Via role-based access controls
Access restriction testing frequency At least once a year
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications
  • SOC2
  • SOC3

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes SOC2

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Orchestration and configuration management tools shall be used across all platform systems to enforce a consistent configuration state and negate configuration drift. Target configurations shall be maintained in a source code management system for versioning and change tracking.

All system configuration changes to production systems are shall be subject to testing, review, and approval before deployment. Evidence of testing in a staging environment shall be formally documented and reviewed by another operations engineer prior to approval for deployment.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Each application server runs intrusion detection software which scans for system vulnerabilities from within the production network. Vulnerability scans originating from an external perspective are conducted on an ongoing basis using commercial tools. This outside-in approach ensures that any possible issue will be discovered. Once a legitimate vulnerability has been identified it is ticketed and prioritized for remediation.
Protective monitoring type Supplier-defined controls
Protective monitoring approach Operating system vulnerability scanning shall be conducted on a monthly basis using commercial tools. In scope assets include:
All systems and services with public-facing IP addresses;
Representative systems of each service component type; and
All self-hosted business systems and supporting devices.

Vulnerability definitions shall be updated at least weekly.

Any vulnerabilities scored as "critical" or "high" severity shall be analyzed for impact and prioritized for remediation accordingly. Lower scoring vulnerabilities will be addressed within regular patch management cadence as defined in Patch Management.
Incident management type Supplier-defined controls
Incident management approach The ISO shall define detailed procedures to provide for consistent and effective management of Information Security incidents. Information Security Incident Management procedures shall include:
Defined processes for security incident detection, impact analysis & classification, mitigation & containment, and remediation;
Documentation and communication requirements both for internal circulation and to customers or law enforcement agencies where appropriate;
Management and staff responsibilities in the incident handling process; and
A defined process to capture and apply knowledge gained from Information Security incidents to reduce the impact or likelihood of future occurrences.

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Public sector networks
Connection to public sector networks No


Price £3 to £16 per device per month
Discount for educational organisations Yes
Free trial available Yes
Description of free trial No limitations, full platform access for 2 weeks

Service documents

Return to top ↑