Snaplogic provides capabilities to enable users to integrate, transform and access data of any type anywhere and anytime.
This is done via a self service code free approach reducing integration time and cost by up to 80%.
True Integration as a Service
- Citizen Integrator- Self Service Integration, Integration as a service
- Code Free, Machine learning Integration assistant
- Unlimited Users, unlimited throughput, analytics
- AWS multi-tenant- Azure or Google. SAP, oracle On-Premise, Hybrid
- Automation and reuse,
- Secure- SOC2 compliant,
- Hadoop, Spark, Yarn, JDBC, IOT, Oracle, workday, Microsoft
- Autodocumentation, load balancing, Real time, Batch, triggered
- futurerproof, JSON Native
- self service- removes technical debt thanks to code free approach
- speed- deliver solutions to the business 80% faster
- cost saving- reduced dependence on expensive resources, deliver faster
- Secure- global banks and pharmaceutical companies use us
- Hybrid- enable the cloud- from full on-premise to full cloud
- SAAS- no upgrade issues and associated costs
- automation and reuse- develop once use many
- cloud agnostic- enables use of any cloud provider
- scalable- single customer moving 2.25 billion documents a day
- Enable continuous agile development
£12000 per instance per month
SnapLogic UK Limited
0203 795 2786
|Service constraints||No known constraints|
|Email or online ticketing support||Email or online ticketing|
|Support response times||
24*7 365 support
Priority 1- 1 hour response, 2 hour resolution target
Priority 2- 4 hour response, 8 hour resolution target
Priority 3- 8 hour response, 24 hour resolution target
Priority 4- 2 day response, 4 day resolution target
|User can manage status and priority of support tickets||Yes|
|Online ticketing support accessibility||None or don’t know|
|Phone support availability||24 hours, 7 days a week|
|Web chat support||No|
|Onsite support||Yes, at extra cost|
Normal support is included- 24*7 365- in the Snaplogic pricing
This can be extended should this be required and higher response times needed.
|Support available to third parties||Yes|
Onboarding and offboarding
Snaplogic is designed for ease of use and due to this is very easy to learn, even for those without any technical background.
We have online training,
instructor lead training,
and user documentation- doc.snaplogic.com
We are unlimited user licence and so ease of use is paramount.
Customers have trained 100-400 users in a single year.
|End-of-contract data extraction||
We do not store any customer data and so there is no data to be exported.
We only ever deal in metadata.
The metadata around each integration pipeline can be accessed and downloaded at contract end.
|End-of-contract process||At the end of a contract as a SAAS solution the access to the controlplane and compute resource will stop. This is the end of the subscription service.|
Using the service
|Web browser interface||Yes|
|Using the web interface||
Snaplogic is a full SAAS solution accessed via a browser. HTML5 Https
All changes can be made via the Snaplogic Control Plane- Development, Monitoring and Management.
The control plane is a GUI designed for ease of access and use.
There is a machine learning powered Integration Assistant to enable rapid development.
Auto documentation, templating, versioning and system optimisation are all available via the control plane
|Web interface accessibility standard||None or don’t know|
|How the web interface is accessible||
The snaplogic GUI is an integration designer based around graphical representations of integration requirements such as - Extract, transform, Load.
The Integration assistant provides a machine learning powered solution to enable ease of use to technical and non-technical users.
|Web interface accessibility testing||The Snaplogic platform can be used by any user who can utilise a browser.|
|What users can and can't do using the API||
Snaplogic is designed to work with all modern API's and API management solutions.
SnapLogic’s unified integration platform as a service (iPaaS) allows citizen integrators and developers to build multi-point integration pipelines that connect cloud and on-premises applications as well as disparate enterprise data sources for big data analytics, and expose them as RESTful APIs. These APIs can be invoked by any authorized user, application, web backend or mobile app through a simple and standardized HTTP call, in order to trigger the execution of the SnapLogic pipeline.
As well as REST we can also work with SOAP and can create custom integrations/ APIs for specific applications, we have over 400 different connectors and customers can also develop their own.
|API automation tools||
|Other API automation tools||Checking|
|API documentation formats||
|Command line interface||No|
|Independence of resources||
Each customer has their own stand alone control plane instance.
Compute power is delivered by the Snaplexes which are independent of the control plane. Snaplexes are under the control of the customer and are often placed behind the firewall thus the customer has full resource control and visibility
|Infrastructure or application metrics||Yes|
|Supplier type||Not a reseller|
|Staff security clearance||Other security clearance|
|Government security clearance||Up to Baseline Personnel Security Standard (BPSS)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||
|User control over data storage and processing locations||Yes|
|Datacentre security standards||Complies with a recognised standard (for example CSA CCM version 3.0)|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||Another external penetration testing organisation|
|Protecting data at rest||Physical access control, complying with SSAE-16 / ISAE 3402|
|Data sanitisation process||Yes|
|Data sanitisation type||Explicit overwriting of storage before reallocation|
|Equipment disposal approach||Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001|
Backup and recovery
|Backup and recovery||Yes|
|What’s backed up||
We are AWS hosted and hence inherit all the benefits of their multi tenancy and backup facilities.
Backups of the metadata that define the integration pipelines occur automatically.
Users do not have to backup their integrations but we can enable this if required.
|Datacentre setup||Multiple datacentres with disaster recovery|
|Scheduling backups||Supplier controls the whole backup schedule|
|Backup recovery||Users can recover backups themselves, for example through a web interface|
|Data protection between buyer and supplier networks||
|Other protection between networks||
All data and metadata is encrypted at all times.
Enhanced encryption can also be implemented so that there is no way data can be accessed in transit.
Further details outlining the full data flow and encryption are available.
|Data protection within supplier network||
Availability and resilience
If Customer believes that SnapLogic has failed to maintain Service Availability for a particular month and wishes to receive a Service Credit (as defined below), Customer must notify SnapLogic within ten (10) Business Days following the end of the month in which the failure occurred. Service level claims will be verified against SnapLogic’s system records, which will prevail in event of any conflict with Customer records. Availability measurements will be conducted by SnapLogic. Subject to the procedures in this section, in the event of a verified failure, SnapLogic will credit Customer’s account one day’s current monthly fees for each one full percent (1%) of Service unavailability in such month below the Service availability percentage (“Service Credits”). Service Credits in any month will not exceed twenty-five percent (25%) of monthly fees and will be applied in the month following the Service unavailability only.
|Approach to resilience||
AWS Dedicated Multi Tenancy,
integrations can also be designed to be run without full dependence on AWS. As a loosely coupled streaming solution we are highly resilient.
Public site- http://trust.snaplogic.com/
API and email
Full monitoring and API is available from the Control plane as well.
Identity and authentication
|Access restrictions in management interfaces and support channels||
We would work with the customer to define best practice and models depending on their requirements.
All roles can inherit the rights from an Access Provider eg. via SAML
This ensures that individual can only see the data that they have been granted access to.
Encryption is available down to field level.
|Access restriction testing frequency||At least every 6 months|
|Management access authentication||
|Devices users manage the service through||Directly from any device which may also be used for normal business (for example web browsing or viewing external email)|
Audit information for users
|Access to user activity audit information||Users have access to real-time audit information|
|How long user audit data is stored for||User-defined|
|Access to supplier activity audit information||Users have access to real-time audit information|
|How long supplier audit data is stored for||At least 12 months|
|How long system logs are stored for||Between 6 months and 12 months|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security accreditations||Yes|
|Any other security accreditations||
|Named board-level person responsible for service security||Yes|
|Security governance accreditation||Yes|
|Security governance standards||Other|
|Other security governance standards||
Type 1 SSAE 6
ISAE 3402 2016
SOC II Type 2
SOC 1/ ISAE 4302
SOC 3 ( physical and logical integrity, confidentiality, privacy)
HIPAA, PCI DSS level 1, FERPA
ISO 27001, FedRAMP(SM)
ITAR, FIPS 140-2
CSA, MPAA, MTCS Tier 3
DoD CSM Levels 1-2, 3-5
|Information security policies and processes||
SOC 1/ ISAE 4302
SOC 3 (continuity of service, physical and logical integrity, confidentiality, privacy)
HIPAA, PCI DSS level 1, FERPA
ISO 27001, FedRAMP(SM)
DIACAP and FISMA
ITAR, FIPS 140-2
CSA, MPAA, MTCS Tier 3
DoD CSM Levels 1-2, 3-5
|Configuration and change management standard||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Configuration and change management approach||
Security is paramount and all configuration and change management processes are followed.
All components are tracked through their lifecycle and kept up to date to ensure security is not impacted.
Full process and best practice is available at request
|Vulnerability management type||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Vulnerability management approach||
Pen testing twice a year
Patches deployment depends on the severity and where they fit in our SLA:
Patches are deployed as soon as possible for severe threats,
Information is supplied by partner and industry experts as well as our in house specialists.
Timescales can be supplied
|Protective monitoring type||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Protective monitoring approach||
Snaplogic is continually monitored.
As we do not store data but only metadata we are not as inherently challenged as if we are behind the firewall (virtual or physical data centres) then we ineherit all the protective monitoring processes used in house as well as ours.
|Incident management type||Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402|
|Incident management approach||
Real time reporting- http://trust.snaplogic.com/
SnapLogic's site for real-time visibility into system performance and availability
Incidents can be reported via raising tickets, telephone, email via the technical account manager and the Account manager,
Standardised P1-P4 defined response times and level- full details are available
|Approach to secure software development best practice||Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)|
Separation between users
|Virtualisation technology used to keep applications and users sharing the same infrastructure apart||Yes|
|Who implements virtualisation||Supplier|
|Virtualisation technologies used||VMware|
|How shared infrastructure is kept separate||
The only area shared is the control plane.
No customer ever shares a control plane instance.
Integration thorughput is defined by the compute power supplied by the solution owner.
|Price||£12000 per instance per month|
|Discount for educational organisations||No|
|Free trial available||Yes|
|Description of free trial||
AWS live trial.
Not the full version but shows capability and ease of use.
|Link to free trial||https://elastic.snaplogic.com/public/redshift_live_trial/redshift_live_trial.html|
|Pricing document||View uploaded document|
|Terms and conditions document||View uploaded document|