Business Intelligence - Microsoft Power BI
Remarkable Dynamics provide Microsoft PowerBI cloud based Business Intelligence services to allow data reporting, analysis and the presentation of actionable information. Business Intelligence enables end users to make faster, better informed and more successful business decisions, identify market trends and predict potential business trends and opportunities.
Features
- Expose patterns, trends and correlations with Data Visualisation tools
- Rich, interactive and intuitive reporting with online access
- Aggregate disparate sources with Data Virtualisation and Federation
- Cloud-based business analytics service
- Automated Extract Trasnform And Load
- AI Trend anyalysis
- Ask questions of your data
- Machine Learning
Benefits
- Interactive personalised dashboards and reports
- Integration with a wide array of data sources
- Frequent and consistent updates
- Cost effective with quick return on investment
- Scalability, convenient data integration, and advanced AI features
- The power of modern AI systems at hand
- Added functionality with other Microsoft apps
- Frequent and consistent updates
Pricing
£650 to £1,200 a unit a day
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
1 0 5 3 8 3 5 2 0 3 4 5 4 0 3
Contact
Remarkable Dynamics
Owen Davies
Telephone: 01483 608 200
Email: owen@remarkabledynamics.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
-
Additional development facilities to complement the PowerBI Data Visualisation - bring in data from any data source
Our team understand the business, not just the technology. - Cloud deployment model
- Public cloud
- Service constraints
- Users will be required to agree to Microsoft Terms and Conditions
- System requirements
- Appropriate licensing from Microsoft
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Within 4 hours during business hours.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Onsite support
- Support levels
-
Support is provided on a tiered approach, levels 1-3.
Depending on the agreement, service levels may be included in warranty or contractual or may be subject to extra costs - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Full demo, training and after sales support
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- All instances are owned by the end client, therefore there is no handover required
- End-of-contract process
- All IP and products are delivered during the contract, no specific handover is required
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Microsoft mobile support
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- No
- Customisation available
- Yes
- Description of customisation
- All levels of service are customisable
Scaling
- Independence of resources
- Scaling is provided via the Microsoft Azure cloud platform
Analytics
- Service usage metrics
- Yes
- Metrics types
-
* Usage statistics
* Cost analysis
* Data usage
* Client engagement - Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- No
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- All data is owned by the client under their own license. Data can be extracted either table by table via CSV or Excel output
- Data export formats
-
- CSV
- Other
- Other data export formats
- Excel
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
As per the Microsoft Online Subscription Agreement terms and conditions
https://azure.microsoft.com/en-gb/support/legal/subscription-agreement/ - Approach to resilience
-
Power BI failover?
Power BI maintains multiple instances of each component in Azure datacenters (also known as regions) to guarantee business continuity. If there is an outage, or an issue that causes Power BI to be inaccessible or inoperable in a region, Power BI fails all its components in that region to a backup instance. The failover restores availability and operability to the Power BI service instance in a new region (usually within the same geographic location, as noted in the Microsoft Trust Center).
A failed-over Power BI service instance supports only read operations, which means the following operations aren't supported during failover: refreshes, report publish operations, dashboard or report modifications, and other operations that require changes to Power BI metadata (for example, inserting a comment in a report). Read operations, such as displaying dashboards and displaying reports (that are not based on DirectQuery or Live Connect to on-premises data sources) continue to function normally.
https://docs.microsoft.com/en-us/power-bi/admin/service-admin-failover#:~:text=What%20does%20%22high%20availability%22%20mean,supported%20by%20a%2099.9%25%20SLA. - Outage reporting
-
Microsoft maintain a health check for PowerBI Service here:
https://powerbi.microsoft.com/en-us/support/
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Username or password
- Access restrictions in management interfaces and support channels
-
The Power BI service is built on Azure, which is Microsoft’s cloud computing infrastructure and platform. The Power BI service architecture is based on two clusters – the Web Front End (WFE) cluster and the Back-End cluster. The WFE cluster manages the initial connection and authentication to the Power BI service, and once authenticated, the Back-End handles all subsequent user interactions. Power BI uses Azure Active Directory (AAD) to store and manage user identities, and manages the storage of data and metadata using Azure BLOB and Azure SQL Database, respectively.
https://docs.microsoft.com/en-us/power-bi/admin/service-admin-power-bi-security - Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- You control when users can access audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- Between 1 month and 6 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Peers Quality Assurance Ltd
- ISO/IEC 27001 accreditation date
- 15/06/2023
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
Processes Create an overall approach to information security.
Detect and preempt information security breaches such as misuse of networks, data, applications, and computer systems.
Maintain the reputation of the organization, and uphold ethical and legal responsibilities.
Respect customer rights, including how to react to inquiries and complaints about non-compliance.
We publish a InfoSec policy which include reporting, rectification and standards.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- We maintain a roadmap for all releases based on an iterative agile approach. Deliverable are based on the roadmap and can be assessed at any stage
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Please see the Microsoft policy/documentation on PowerBI
https://docs.microsoft.com/en-us/power-bi/admin/service-admin-power-bi-security - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- "At many points across our global network, internal traffic is inspected for suspicious behavior, such as the presence of traffic that might indicate botnet connections. This analysis is performed using a combination of open-source and commercial tools for traffic capture and parsing. A proprietary correlation system built on top of PowerBI technology also supports this analysis. Network analysis is supplemented by examining system logs to identify unusual behavior, such as attempted access of customer data. Microsoft security engineers place standing search alerts on public data repositories to look for security incidents that might affect the company’s infrastructure.
- Incident management type
- Supplier-defined controls
- Incident management approach
-
PowerBI Contains linked resources to the Microsoft Ticketing support system. Pre defined ticket types are configured.
All documentation is list at:
https://powerbi.microsoft.com/en-us/support/
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Equal opportunity
Fighting climate change
We are committed to environmental conservation, our policies state we are to reduce the amount of usage of non recyclable materials and use less energy.Covid-19 recovery
All our work practices take into account needs of Covid 19 awarenessEqual opportunity
The company maintains an equal opportunity policy. This policy is available on request.
Pricing
- Price
- £650 to £1,200 a unit a day
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- All clients are welcome to discuss what we can do to complete a "Proof of Concept"