Bedrock Analytics (Healthcare)
Bedrock Analytics is a premier reporting platform based on Tableau Desktop and Tableau Server.
Available to Bedrock Data Warehouse Clients.
Ultra high-performance in-memory data-server underpins Tableau server to present extremely large datasets in real-time for organisation-wide intelligence at any scale.
Features
- Powerful Analytics Engine based on Tableau
- Pre Built NHS models
- Fully Fledged reporting tool, powered by Tableau
- KPI/Dashboard Library, providing an extensive library of prebuilt indicators/dashboards
Benefits
- Create reports quickly with a familiar Tableau interface
- Use pre-built reports and templates
Pricing
£0 to £50,000 a unit a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
1 0 9 4 8 9 2 2 7 2 1 6 3 6 6
Contact
New Company Services Ltd
Zoe Dronfield
Telephone: +447779029737
Email: zoe.dronfield@ncs-it.co.uk
Service scope
- Service constraints
- No known constraints.
- System requirements
-
- Any modern browser
- Windows or Mac for desktop client
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
We aim to acknowledge receipt of support requests within one working day unless the request is for a Priority 1 (Critical) in which case we will agree a mutual agreeable response time. Please contact us directly for further information by email: info@bedrockdw.co.uk or call 07947809620.
Weekend response times are as standard as per weekdays unless agreed otherwise. - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 A
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Onsite support
- Support levels
- We provide a standard Service Level Agreement to all our customers. In addition, we provide 24/7 Service Levels and custom Service Levels as required. Please contact us directly for further information by email: info@bedrockdw.co.uk or call 07947809620.
- Support available to third parties
- No
Onboarding and offboarding
- Getting started
-
Typically Bedrock is implanted in collaboration with the customer. Assistance involve the following:
- Knowledge Transfer
- Onsite Training
- Web based Training
- Documentation - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Bedrock included the ability to extract all data held into standard flat file formats.
- End-of-contract process
- All services including the extraction of data are included in the contract price.
Using the service
- Web browser interface
- Yes
- Using the web interface
- Bedrock Analytics is web based for consumption by end users, reports can be viewed edited and even created.
- Web interface accessibility standard
- None or don’t know
- How the web interface is accessible
- Will meet standards shortly
- Web interface accessibility testing
- Run through a set of standard tests
- API
- Yes
- What users can and can't do using the API
- Metadata Management provides information of any existing fields in the DW. Users can update the metadata to decide which type of Trust they are and which data structure they use.
- API automation tools
- Other
- Other API automation tools
-
- Bedrock Monitoring API (monitor load processes)
- Pathway Management APIs (patient pathway information)
- A&E Breach Alerts API (notifies of any A&E Breaches)
- KPI Sandbox API (notifications for KPI alerts)
- API documentation
- Yes
- API documentation formats
-
- HTML
- Other
- Command line interface
- No
Scaling
- Scaling available
- Yes
- Scaling type
-
- Automatic
- Manual
- Independence of resources
-
Our service is over provisioned based on peak throughput. In addition to this QOS mechanisms are in place.
Depending on tier, clients will get dedicated resource. - Usage notifications
- Yes
- Usage reporting
-
- API
- SMS
- Other
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- HTTP request and response status
- Memory
- Network
- Number of active instances
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Backup and recovery
- Backup and recovery
- No
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Bonded fibre optic connections
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- System can be configured to be available during core business hours or to be highly available. 99.99% uptime. In the event of a failure a recovery operation will be conducted. Service credits are used where a refund is required.
- Approach to resilience
- Our services are split across multiple data centres.
- Outage reporting
- Email and System Alerts.
Identity and authentication
- User authentication
- 2-factor authentication
- Access restrictions in management interfaces and support channels
- There is a robust security process, administrators cannot access data
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
- 2-factor authentication
- Devices users manage the service through
-
- Dedicated device over multiple services or networks
- Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Data Security & Information Governance Training
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
We are experienced in implementing Change Management Software as standard across all software implementations allowing us to track changes to all artefacts including requirements/code.
This covers two important aspects:
Managing changes to the DW using software tools (e.g. Jira) and Dev OPS backed by source control
Implementing/approving changes using an existing Change Approval Board. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Threats are continuously monitored using a variety of tools and techniques.
1) Sophisticated Network Monitoring
2) Virus/Threat Scanning - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- A commercial SIEM tool is used and monitored 24x7
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Our environment uses a commercial solution (Manageengine) to manage incidents.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Supplier
- Virtualisation technologies used
- Hyper-V
- How shared infrastructure is kept separate
- Network segregation is implemented by creating virtual datacentres for each client.
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
-
Our data centres use modern up to date equipment in every aspect:
- Modern servers and storage
- Efficient cooling with hot/cold isle
- High density
Social Value
- Fighting climate change
-
Fighting climate change
We are a green organisation and actively encourage employees, customers and our counterparts to support environmental protection and improvement. - Covid-19 recovery
-
Covid-19 recovery
Covid-19 recovery
Social Value is an integral part of Business Life, more so now than ever before. We as an organisation are committed to aiding the recovery from the impact of COVID-19. We do this by providing employment, re-training and return to work initiatives. We understand that COVID-19 has impacted all lives and livelihoods and have supported and continue to support employees that have been affected and those that are shielding. We have adopted a different way of working to ensure the safety and well-being of our employees, we have embraced all technologies possible to aid remote and virtual office working and have embraced the new normal. This has been a difficult change and transition and have supported employees continuously through this transition and continue to do so. - Tackling economic inequality
-
Tackling economic inequality
Economic Inequality is still very much ripe in todays world. We are a small but growing organisation and tackle economic inequality by creating business growth, new jobs and new skills. We operate our business both locally and nationally in the UK, this allows us to provide employment and training opportunities across high growth sectors providing opportunities to bridge any skills gaps. - Equal opportunity
-
Equal opportunity
We are an equal opportunity provider and embrace diversity via our Equal Opportunities Recruitment Policy. We offer advice and support for all types of disabilities and ensure we can provide training programmes relative to specific needs such as visual impairment etc. - Wellbeing
-
Wellbeing
We are committed to improving and promoting the Health and Well-being of our workforce. We do this by adopting a simple but effective Employee Health and Wellbeing Strategy utilising the Employee Health and Well-being Portal, advisory services and in-house activities both to aid mental and physical well-being. The benefits derived by the employees include Improved Productivity, Decreases Absenteeism, Improved Engagement and Higher Employee Retention. The Health and Well-being of our employees is of the utmost importance.
Pricing
- Price
- £0 to £50,000 a unit a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Proof of Concepts(PoC) are available on request.