SnapLogic UK Limited

Integration Platform as a Service IPAAS

Snaplogic provides capabilities to enable users to integrate, transform and access data of any type anywhere and anytime.

This is done via a self service code free approach reducing integration time and cost by up to 80%.

True Integration as a Service

Features

  • Citizen Integrator- Self Service Integration, Integration as a service
  • Code Free, Machine learning Integration assistant
  • Unlimited Users, unlimited throughput, analytics
  • AWS multi-tenant- Azure or Google. SAP, oracle On-Premise, Hybrid
  • Automation and reuse,
  • Secure- SOC2 compliant,
  • Hadoop, Spark, Yarn, JDBC, IOT, Oracle, workday, Microsoft
  • Autodocumentation, load balancing, Real time, Batch, triggered
  • doc.snaplogic.com
  • futurerproof, JSON Native

Benefits

  • self service- removes technical debt thanks to code free approach
  • speed- deliver solutions to the business 80% faster
  • cost saving- reduced dependence on expensive resources, deliver faster
  • Secure- global banks and pharmaceutical companies use us
  • Hybrid- enable the cloud- from full on-premise to full cloud
  • SAAS- no upgrade issues and associated costs
  • automation and reuse- develop once use many
  • cloud agnostic- enables use of any cloud provider
  • scalable- single customer moving 2.25 billion documents a day
  • Enable continuous agile development

Pricing

£12000 per instance per month

Service documents

G-Cloud 9

829136719499307

SnapLogic UK Limited

Neerav Shah

0203 795 2786

nshah@snaplogic.com

Service scope

Service scope
Service constraints No known constraints
System requirements
  • No specific requirements other than access to the internet
  • Full tech details here- doc.snaplogic.com

User support

User support
Email or online ticketing support Email or online ticketing
Support response times 24*7 365 support

Priority 1- 1 hour response, 2 hour resolution target
Priority 2- 4 hour response, 8 hour resolution target
Priority 3- 8 hour response, 24 hour resolution target
Priority 4- 2 day response, 4 day resolution target
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support Yes, at extra cost
Support levels Normal support is included- 24*7 365- in the Snaplogic pricing

This can be extended should this be required and higher response times needed.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Snaplogic is designed for ease of use and due to this is very easy to learn, even for those without any technical background.
We have online training,
instructor lead training,
a community
and user documentation- doc.snaplogic.com

We are unlimited user licence and so ease of use is paramount.
Customers have trained 100-400 users in a single year.
Service documentation Yes
Documentation formats HTML
End-of-contract data extraction We do not store any customer data and so there is no data to be exported.

We only ever deal in metadata.

The metadata around each integration pipeline can be accessed and downloaded at contract end.
End-of-contract process At the end of a contract as a SAAS solution the access to the controlplane and compute resource will stop. This is the end of the subscription service.

Using the service

Using the service
Web browser interface Yes
Using the web interface Snaplogic is a full SAAS solution accessed via a browser. HTML5 Https

All changes can be made via the Snaplogic Control Plane- Development, Monitoring and Management.

The control plane is a GUI designed for ease of access and use.

There is a machine learning powered Integration Assistant to enable rapid development.

Auto documentation, templating, versioning and system optimisation are all available via the control plane
Web interface accessibility standard None or don’t know
How the web interface is accessible The snaplogic GUI is an integration designer based around graphical representations of integration requirements such as - Extract, transform, Load.

The Integration assistant provides a machine learning powered solution to enable ease of use to technical and non-technical users.
Web interface accessibility testing The Snaplogic platform can be used by any user who can utilise a browser.
API Yes
What users can and can't do using the API http://doc.snaplogic.com/public-api-documentation

Snaplogic is designed to work with all modern API's and API management solutions.

SnapLogic’s unified integration platform as a service (iPaaS) allows citizen integrators and developers to build multi-point integration pipelines that connect cloud and on-premises applications as well as disparate enterprise data sources for big data analytics, and expose them as RESTful APIs. These APIs can be invoked by any authorized user, application, web backend or mobile app through a simple and standardized HTTP call, in order to trigger the execution of the SnapLogic pipeline.

As well as REST we can also work with SOAP and can create custom integrations/ APIs for specific applications, we have over 400 different connectors and customers can also develop their own.

doc.snaplogic.com
API automation tools
  • Ansible
  • Chef
  • OpenStack
  • SaltStack
  • Terraform
  • Puppet
  • Other
Other API automation tools Checking
API documentation Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
  • ODF
  • PDF
Command line interface No

Scaling

Scaling
Scaling available Yes
Scaling type Manual
Independence of resources Each customer has their own stand alone control plane instance.

Compute power is delivered by the Snaplexes which are independent of the control plane. Snaplexes are under the control of the customer and are often placed behind the firewall thus the customer has full resource control and visibility
Usage notifications Yes
Usage reporting
  • API
  • Email
  • Other

Analytics

Analytics
Infrastructure or application metrics Yes
Metrics types
  • CPU
  • HTTP request and response status
  • Memory
  • Number of active instances
Reporting types
  • API access
  • Real-time dashboards

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • EU-US Privacy Shield agreement locations
  • Other locations
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest Physical access control, complying with SSAE-16 / ISAE 3402
Data sanitisation process Yes
Data sanitisation type Explicit overwriting of storage before reallocation
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Backup and recovery

Backup and recovery
Backup and recovery Yes
What’s backed up
  • Metatadata
  • https://aws.amazon.com/backup-recovery/
  • AWS files
Backup controls We are AWS hosted and hence inherit all the benefits of their multi tenancy and backup facilities.

Backups of the metadata that define the integration pipelines occur automatically.

Users do not have to backup their integrations but we can enable this if required.
Datacentre setup Multiple datacentres with disaster recovery
Scheduling backups Supplier controls the whole backup schedule
Backup recovery Users can recover backups themselves, for example through a web interface

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)
  • Other
Other protection between networks All data and metadata is encrypted at all times.

Enhanced encryption can also be implemented so that there is no way data can be accessed in transit.

Further details outlining the full data flow and encryption are available.
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Availability and resilience
Guaranteed availability 99.95%

If Customer believes that SnapLogic has failed to maintain Service Availability for a particular month and wishes to receive a Service Credit (as defined below), Customer must notify SnapLogic within ten (10) Business Days following the end of the month in which the failure occurred. Service level claims will be verified against SnapLogic’s system records, which will prevail in event of any conflict with Customer records. Availability measurements will be conducted by SnapLogic. Subject to the procedures in this section, in the event of a verified failure, SnapLogic will credit Customer’s account one day’s current monthly fees for each one full percent (1%) of Service unavailability in such month below the Service availability percentage (“Service Credits”). Service Credits in any month will not exceed twenty-five percent (25%) of monthly fees and will be applied in the month following the Service unavailability only.
Approach to resilience AWS Dedicated Multi Tenancy,
integrations can also be designed to be run without full dependence on AWS. As a loosely coupled streaming solution we are highly resilient.
Outage reporting Public site- http://trust.snaplogic.com/

API and email

Full monitoring and API is available from the Control plane as well.

Identity and authentication

Identity and authentication
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google apps)
  • Username or password
Access restrictions in management interfaces and support channels We would work with the customer to define best practice and models depending on their requirements.

All roles can inherit the rights from an Access Provider eg. via SAML

This ensures that individual can only see the data that they have been granted access to.

Encryption is available down to field level.
Access restriction testing frequency At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Devices users manage the service through Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for Between 6 months and 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security accreditations Yes
Any other security accreditations
  • https://www.snaplogic.com/security
  • SSAE Soc 2 Type II
  • EU-Safe Harbor certified through TRUSTe
  • Secure access via HTTPS (SSL/TLS)
  • Single Sign On (SSO) SAML, Active Directory
  • ISAE 3402
  • Truste

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance accreditation Yes
Security governance standards Other
Other security governance standards Type 1 SSAE 6
ISAE 3402 2016
SOC II Type 2

https://www.snaplogic.com/security

SOC 1/ ISAE 4302
SOC 3 ( physical and logical integrity, confidentiality, privacy)
HIPAA, PCI DSS level 1, FERPA
ISO 27001, FedRAMP(SM)
DIACAP, FISMA
ITAR, FIPS 140-2
CSA, MPAA, MTCS Tier 3
DoD CSM Levels 1-2, 3-5
Information security policies and processes SOC 1/ ISAE 4302
SOC 3 (continuity of service, physical and logical integrity, confidentiality, privacy)
HIPAA, PCI DSS level 1, FERPA
ISO 27001, FedRAMP(SM)
DIACAP and FISMA
ITAR, FIPS 140-2
CSA, MPAA, MTCS Tier 3
DoD CSM Levels 1-2, 3-5

Operational security

Operational security
Configuration and change management standard Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach Security is paramount and all configuration and change management processes are followed.

All components are tracked through their lifecycle and kept up to date to ensure security is not impacted.

Full process and best practice is available at request
Vulnerability management type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach Pen testing twice a year
Patches deployment depends on the severity and where they fit in our SLA:
Priority 1-4.

Patches are deployed as soon as possible for severe threats,

Information is supplied by partner and industry experts as well as our in house specialists.

Timescales can be supplied
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach Snaplogic is continually monitored.

As we do not store data but only metadata we are not as inherently challenged as if we are behind the firewall (virtual or physical data centres) then we ineherit all the protective monitoring processes used in house as well as ours.
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach Real time reporting- http://trust.snaplogic.com/
SnapLogic's site for real-time visibility into system performance and availability

Incidents can be reported via raising tickets, telephone, email via the technical account manager and the Account manager,

Standardised P1-P4 defined response times and level- full details are available

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Separation between users

Separation between users
Virtualisation technology used to keep applications and users sharing the same infrastructure apart Yes
Who implements virtualisation Supplier
Virtualisation technologies used VMware
How shared infrastructure is kept separate The only area shared is the control plane.

No customer ever shares a control plane instance.

Integration thorughput is defined by the compute power supplied by the solution owner.

Energy efficiency

Energy efficiency
Energy-efficient datacentres Yes

Pricing

Pricing
Price £12000 per instance per month
Discount for educational organisations No
Free trial available Yes
Description of free trial AWS live trial.

Not the full version but shows capability and ease of use.

https://elastic.snaplogic.com/public/redshift_live_trial/redshift_live_trial.html
Link to free trial https://elastic.snaplogic.com/public/redshift_live_trial/redshift_live_trial.html

Documents

Documents
Pricing document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑