Skip to main content

Help us improve the Digital Marketplace - send your feedback

Remarkable Dynamics

Business Intelligence - Microsoft Power BI

Remarkable Dynamics provide Microsoft PowerBI cloud based Business Intelligence services to allow data reporting, analysis and the presentation of actionable information. Business Intelligence enables end users to make faster, better informed and more successful business decisions, identify market trends and predict potential business trends and opportunities.

Features

  • Expose patterns, trends and correlations with Data Visualisation tools
  • Rich, interactive and intuitive reporting with online access
  • Aggregate disparate sources with Data Virtualisation and Federation
  • Cloud-based business analytics service
  • Automated Extract Trasnform And Load
  • AI Trend anyalysis
  • Ask questions of your data
  • Machine Learning

Benefits

  • Interactive personalised dashboards and reports
  • Integration with a wide array of data sources
  • Frequent and consistent updates
  • Cost effective with quick return on investment
  • Scalability, convenient data integration, and advanced AI features
  • The power of modern AI systems at hand
  • Added functionality with other Microsoft apps
  • Frequent and consistent updates

Pricing

£650 to £1,200 a unit a day

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at owen@remarkabledynamics.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

1 0 5 3 8 3 5 2 0 3 4 5 4 0 3

Contact

Remarkable Dynamics Owen Davies
Telephone: 01483 608 200
Email: owen@remarkabledynamics.com

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Additional development facilities to complement the PowerBI Data Visualisation - bring in data from any data source

Our team understand the business, not just the technology.
Cloud deployment model
Public cloud
Service constraints
Users will be required to agree to Microsoft Terms and Conditions
System requirements
Appropriate licensing from Microsoft

User support

Email or online ticketing support
Email or online ticketing
Support response times
Within 4 hours during business hours.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Onsite support
Support levels
Support is provided on a tiered approach, levels 1-3.

Depending on the agreement, service levels may be included in warranty or contractual or may be subject to extra costs
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Full demo, training and after sales support
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
All instances are owned by the end client, therefore there is no handover required
End-of-contract process
All IP and products are delivered during the contract, no specific handover is required

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Microsoft mobile support
Service interface
No
User support accessibility
None or don’t know
API
No
Customisation available
Yes
Description of customisation
All levels of service are customisable

Scaling

Independence of resources
Scaling is provided via the Microsoft Azure cloud platform

Analytics

Service usage metrics
Yes
Metrics types
* Usage statistics
* Cost analysis
* Data usage
* Client engagement
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
In-house
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
No
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
All data is owned by the client under their own license. Data can be extracted either table by table via CSV or Excel output
Data export formats
  • CSV
  • Other
Other data export formats
Excel
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
As per the Microsoft Online Subscription Agreement terms and conditions

https://azure.microsoft.com/en-gb/support/legal/subscription-agreement/
Approach to resilience
Power BI failover?

Power BI maintains multiple instances of each component in Azure datacenters (also known as regions) to guarantee business continuity. If there is an outage, or an issue that causes Power BI to be inaccessible or inoperable in a region, Power BI fails all its components in that region to a backup instance. The failover restores availability and operability to the Power BI service instance in a new region (usually within the same geographic location, as noted in the Microsoft Trust Center).

A failed-over Power BI service instance supports only read operations, which means the following operations aren't supported during failover: refreshes, report publish operations, dashboard or report modifications, and other operations that require changes to Power BI metadata (for example, inserting a comment in a report). Read operations, such as displaying dashboards and displaying reports (that are not based on DirectQuery or Live Connect to on-premises data sources) continue to function normally.

https://docs.microsoft.com/en-us/power-bi/admin/service-admin-failover#:~:text=What%20does%20%22high%20availability%22%20mean,supported%20by%20a%2099.9%25%20SLA.
Outage reporting
Microsoft maintain a health check for PowerBI Service here:

https://powerbi.microsoft.com/en-us/support/

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password
Access restrictions in management interfaces and support channels
The Power BI service is built on Azure, which is Microsoft’s cloud computing infrastructure and platform. The Power BI service architecture is based on two clusters – the Web Front End (WFE) cluster and the Back-End cluster. The WFE cluster manages the initial connection and authentication to the Power BI service, and once authenticated, the Back-End handles all subsequent user interactions. Power BI uses Azure Active Directory (AAD) to store and manage user identities, and manages the storage of data and metadata using Azure BLOB and Azure SQL Database, respectively.

https://docs.microsoft.com/en-us/power-bi/admin/service-admin-power-bi-security
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
You control when users can access audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
Peers Quality Assurance Ltd
ISO/IEC 27001 accreditation date
15/06/2023
What the ISO/IEC 27001 doesn’t cover
N/A
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Processes Create an overall approach to information security.
Detect and preempt information security breaches such as misuse of networks, data, applications, and computer systems.
Maintain the reputation of the organization, and uphold ethical and legal responsibilities.
Respect customer rights, including how to react to inquiries and complaints about non-compliance.

We publish a InfoSec policy which include reporting, rectification and standards.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
We maintain a roadmap for all releases based on an iterative agile approach. Deliverable are based on the roadmap and can be assessed at any stage
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Please see the Microsoft policy/documentation on PowerBI

https://docs.microsoft.com/en-us/power-bi/admin/service-admin-power-bi-security
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
"At many points across our global network, internal traffic is inspected for suspicious behavior, such as the presence of traffic that might indicate botnet connections. This analysis is performed using a combination of open-source and commercial tools for traffic capture and parsing. A proprietary correlation system built on top of PowerBI technology also supports this analysis. Network analysis is supplemented by examining system logs to identify unusual behavior, such as attempted access of customer data. Microsoft security engineers place standing search alerts on public data repositories to look for security incidents that might affect the company’s infrastructure.
Incident management type
Supplier-defined controls
Incident management approach
PowerBI Contains linked resources to the Microsoft Ticketing support system. Pre defined ticket types are configured.

All documentation is list at:

https://powerbi.microsoft.com/en-us/support/

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Equal opportunity

Fighting climate change

We are committed to environmental conservation, our policies state we are to reduce the amount of usage of non recyclable materials and use less energy.

Covid-19 recovery

All our work practices take into account needs of Covid 19 awareness

Equal opportunity

The company maintains an equal opportunity policy. This policy is available on request.

Pricing

Price
£650 to £1,200 a unit a day
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
All clients are welcome to discuss what we can do to complete a "Proof of Concept"

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at owen@remarkabledynamics.com. Tell them what format you need. It will help if you say what assistive technology you use.