DeployView
Archimate Archi Hosted Solution
Archi is an open source modelling toolkit to create ArchiMate models and sketches. Used by thousands of Enterprise Architects throughout the world.
Features
- Central Repository for Archimate source
- Browser based stakeholder viewing of repository content
- Business models, using business model canvas, capability based planning etc.
- Architecture models with ArchiMate, methods such as TOGAF ADM
Benefits
- Unified Support for Integrated Business Transformation
- Maximum Reuse of Existing Content
- Highly Flexible and Configurable
- Low Total Cost of Ownership
- Fast Return on Investment
- Standards based modelling, allowing easier start-up and no vendor lock-in
- Communicates a digital business vision, and the delivery journey
- Unlocks information value through connection of data silos
- Use enterprise architecture to facilitate all employees to improve performance
- Identify gaps and redundancies in IT portfolio
Pricing
£240 to £600 a person a year
- Free trial available
Service documents
Framework
G-Cloud 12
Service ID
9 6 0 9 2 4 7 4 0 0 2 3 6 5 8
Contact
DeployView
Shafiq Alibhai
Telephone: 07405668776
Email: hello@deployview.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Service constraints
- Minimum 5mbps internet connection
- System requirements
-
- Minimum 5Mbps Internet Backbone
- Chrome 49+, Firefox 44+, Safari 11+
- Opera 36+, IE 11+, Edge 12+
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
SLA:
Urgent 2 hours
High: 12 hours
Normal: 24 hours
During working week. - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web chat accessibility testing
- Standard
- Onsite support
- Yes, at extra cost
- Support levels
- Certified cloud support engineer
- Support available to third parties
- No
Onboarding and offboarding
- Getting started
-
Standard deployment services include:
setup of dedicated hosted environment, configuration, customisation.
Helpdesk support is available at startup. User documentation is available online (and in pdf format). - Service documentation
- Yes
- Documentation formats
-
- HTML
- ODF
- Other
- Other documentation formats
-
- Txt
- Doc
- Docx
- End-of-contract data extraction
- Users can export data from the system by cloning the source repository that is hosted for the user.
- End-of-contract process
- DeployView will provide customers with their entire repository on request and without charge on termination of the service for a period of 30 days.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari 9+
- Opera
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- No
- API
- No
- Customisation available
- Yes
- Description of customisation
- New object templates, scripts for complex functions and calculations; some custom reports can be delivered.
Scaling
- Independence of resources
- Each customer has a dedicated and isolated service resource pool to prevent service degradation as a result of other user demand.
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- EU-US Privacy Shield agreement locations
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Using Archi data can be exported to various formats.
- Data export formats
-
- CSV
- ODF
- Other
- Other data export formats
-
- Open Exchange File
- HTML
- RTF
- MS Word
- MS Powerpoint
- Open Office
- Single page HTML
- Markdown
- Data import formats
-
- CSV
- Other
- Other data import formats
- Open Exchange File
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- 99% uptime
- Approach to resilience
- It's available upon written request
- Outage reporting
- Email alerts sent to customer
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- A separate secure connection is used for administrators to access management interfaces. Additional controls are in place to restrict non administrators accessing management interfaces, including additional assurance on user credentials.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
Through use of Amazon Web Services (AWS) datacentres, the information security standards applicable to DeployView are ISO27018 compliant.
Through partnering with AWS, Deployview hosting services are certified in many security standards including but not limited to DoD SRG, FedRAMP, FIPS, IRAP, ISO 9001, ISO 27001, ISO 27017, ISO 27018, MLPS Level 3, MTCS, PCI DSS Level 1, SEC Rule 17-a-4(f), SOC 1, SOC 2 and SOC 3.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Regular updates, performance monitoring, vulnerabilities and recovery procedures are periodically reviewed.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Provided by Azure: https://azure.microsoft.com/en-gb/services/security-center/
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Provided by Microsoft Azure: https://www.microsoft.com/en-us/trustcenter/security/azure-security
- Incident management type
- Supplier-defined controls
- Incident management approach
-
Each support issue is handled accordingly depending on the priority/criticality of the issue.
Customers are routinely updated in line with our response matrix regarding resolution timelines.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Pricing
- Price
- £240 to £600 a person a year
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
-
DeployView will offer you a free proof of concept service.
Not included:
Consultancy services
Solution configuration
Additional trainer-led sessions