Skip to main content

Help us improve the Digital Marketplace - send your feedback

Ve3 Global Ltd

data analytics and benchmarking

Data Analytics and Benchmarking service helps improve resource allocation within public sector organisations by creating built-in data models and intelligent narratives of the key benchmarks and KPIs needed to improve operational efficiency and effectiveness and presents the results in user friendly and interactive dashboards on an embedded business intelligence portal.

Features

  • Embedded Business intelleigence / Analytics platform on premise or Cloud
  • Self-service decentralised analytic and reporting capabilities
  • Data preparation tools and processes
  • Prescribed statistical functions and algorithms
  • Analytic and interactive dashboards, reporting and visualisation
  • Intelligent narrative reporting
  • Simplified and customisable Analytics and User Experience
  • Business Intelligence, Analysis and Reporting
  • Big Data Manipulation and Full Analysis Capability

Benefits

  • Intuitive Interface Enables Users to Ensure a Reliable Transformation Process
  • Modifications to Incorporate Additional Sources can Easily be Implemented
  • Improved Speed, Quality and Accuracy of reporting with deeper insight
  • Blend All Data in Real Time and Obtain Immediate Results
  • Broad and Deep Big Data Integration
  • In built analysis for total operational performance of schools
  • Automated Processes between collection, analysis and reporting of data

Pricing

£175 to £850 a unit

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at prime@ve3.global. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

1 1 5 3 6 5 8 4 7 4 9 2 1 4 2

Contact

Ve3 Global Ltd Nikhil Alex
Telephone: 02045520840
Email: prime@ve3.global

Service scope

Software add-on or extension
No
Cloud deployment model
Public cloud
Service constraints
None
System requirements
None

User support

Email or online ticketing support
Email or online ticketing
Support response times
Email support is available from 08:00 to 18:00 Monday to Friday
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Single inclusive support level - 1 hr from 8am to 6pm Monday to Friday with individual specified account manager.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We have a three stage process to client engagement: Enable | during the initial client engagement we will have hopefully gained a detailed understanding of our clients requirements and the project initiation phase will ensure we enable our clients to understand what is possible with the solutions they have purchased form us. We will agree the collection and reporting tools they initially require to support there day to day operational requirements and take their data and embed it in our collection and dashoarding tools. Empower | once the raw client data is live we will support the client with a bespoke training plan to ensure they are empowered to use the tools we have provided . This usually takes the form of one to one and group training at client sites as we have found face to face training is more empowering than online training. Engage | we have found it essential to regularly engage with our clients to ensure that their questions are answered and support is provided so the full benefits of our solutions are employed. We therefore schedule monthly appointments with our clients.
Service documentation
No
End-of-contract data extraction
Data is provided to clients at the end of the contract in an excel compatible format at no cost if requested in 30 days of the contract expiring.
End-of-contract process
At the end of the contract all user accounts will be deactivated within 4 hours and deleted within 48 hours. When the contract ends we will provide the data to clients in an excel format if requested during the first 30 days from the termination of the contract free of charge. At the end of the 30 days the data will be archived for a 12 month period; if the data is requested during that period there will be a charge for data recovery. At the end of the 12 months the client data will be deleted.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Chrome
  • Safari
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Data collection from surveys undertaken on mobile devices. Reporting of data on desktop but also accessible on mobile.
Service interface
No
User support accessibility
None or don’t know
API
Yes
What users can and can't do using the API
At the moment our approach to using the REST API has been on a client specific basis and as such we have not placed any limitations on what a client can do.
API documentation
Yes
API documentation formats
PDF
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
At VE3, we deeply understand the significance of tailored solutions to enhance user engagement, facilitate knowledge sharing, and uncover value in diverse public sector markets, exemplified by our School Benchmarking Service. We offer a spectrum of user personalization options, ranging from basic features like client and user-specific branding to crafting data capture solutions and dashboards tailored to support client-specific key performance indicators (KPIs).

During the onboarding process, we collaborate closely with clients to define customization requirements, ensuring alignment with their unique needs and objectives. However, we remain flexible, allowing clients to incorporate customizations at any stage of our partnership.

In our standard service offering, clients can develop their data collection templates and dashboards using Excel and Power BI templates provided by our team. These customized solutions are seamlessly integrated into our cloud-based platform by our experts.

For clients seeking a more tailored approach, our bespoke offering empowers them to deploy templates and dashboards independently. While this option provides greater autonomy, it may require additional training and support, which we are fully equipped to provide.

Scaling

Independence of resources
We closely monitor the service performance of the client solutions we put in place and the use of the Microsoft Azure server platform allows us to scale the solution to meet client demand almost instantaneously.

Analytics

Service usage metrics
Yes
Metrics types
We are able to monitor and report on user access and if they have completed the tasks allocated to them. Reports are available by user and by client.
Reporting types
Reports on request

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Microsoft Azure and Business Intelligence

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
Physical access control, complying with CSA CCM v3.0
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
We have a standard set of dashboards which allow users to export data in the form or excel tables and pdf reports.
Data export formats
  • CSV
  • Other
Other data export formats
PDF
Data import formats
  • CSV
  • Other
Other data import formats
JSON

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
The solution is hosted on the Microsoft Azure platform and as such we are able to offer availability of 99.99%. Where we do not meet that availability, we will offer clients a 25% credit on the daily charge.
Approach to resilience
The resilience of our solution is provide though our investment in the Microsoft Azure platform on which our solution is built.
Outage reporting
Any outage issues will be reported to clients by email.

Identity and authentication

User authentication needed
Yes
User authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password
Access restrictions in management interfaces and support channels
Access to management and support channels is limited by the permissions layers we apply to users. Currently only two members of our team are able to change user permission and have access to the management interface.
Access restriction testing frequency
At least every 6 months
Management access authentication
2-factor authentication

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
EGAC
ISO/IEC 27001 accreditation date
06/01/2024
What the ISO/IEC 27001 doesn’t cover
N/A
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
Yes
Any other security certifications
  • ISO 22301
  • ISO 14000-1
  • ISO 22000-1
  • ISO 9000-1

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Our Information Security Policy has six distinct strands:
Information | Information is valuable; classifying information as ordinary, confidential, restricted and personal enables us to better protect it. Ordinary being in the public domain restricted and personal being confidential to our clients, partners or staff.
Encryption | a powerful data security tool, deployed on all devices, we also ensure devices can be remotely wiped.
Passwords | Nothing guarantees password security. Staff are advised never to share passwords, ensure it is easy to remember but difficult to guess. It must contain upper and lower case letters, numbers and symbols and are changed every quarter.
Software | we ensure all software is industry standard, with robust update schedules. Only using Microsoft, Apple, Adobe and Norton software, with apps only procured from Apple’s App store.
Cloud | as providers of cloud services we treat security with utmost importance and have followed Microsoft’s advice to the letter deploying appropriate multi factor authentication and additional security.
Hardware | hardware is configured to lock 3 minutes after last use, staff are advised to lock computers when away from them. Cloud services removed the need to transfer data via media as such we restrict external media access.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
We have a clear change management process developed with our development team who utilise a sandbox environment to test any solution before deployment. The six-step process is as follows: Identify | what is the change required? Define | what does this change mean for the current solution, security and services? Develop | how will the change be delivered, what will it look like and how much will it cost? Approve | Director approval of change Deploy | technical lead deploys solution to sandbox solution for approval Review | Director and technical lead review prior to deployment in live environment.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
We utilise the inbuilt protection offered by the Microsoft Azure platform to protect our cloud offering, which provides: Antimalware | protecting our cloud services, virtual machines, and Windows clients helping identify and remove viruses, spyware, and other malicious software, it also provides real-time protection, on-demand scanning, basic configuration management, and monitoring. Denial-of-service defences | protecting our servers against attacks using multiple machines trying to flood the resources of our servers. Advanced Threat Analytics | technology monitoring normal networks, systems, and users usage patterns, and employs machine learning to flag abnormal behaviour. Updates and patches are therefore managed by Microsoft.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Our servers run on the Microsoft Azure infrastructure, and uses the threat management protections that are built into Azure. Azure Security Centre provides a centralized portal from which we secure our Azure deployments and prevent, detect, respond to threats, and increase visibility into the security of our Azure resources. The Azure Security Centre also provides focused security recommendations and rapid deployment of integrated partner technologies. It uses behavioural analytics and machine learning for effective threat detection and helps you build an attack timeline for faster remediation. This means that we are able to resolve issue in under 24 hours.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
We do not have pre-defined process at this stage for the bespoke solution however as we our servers run on the Microsoft Azure infrastructure and uses the incident management tools that are built into Azure platform. This means that we are able to resolve issue in under 24 hours and reports are provided to end users via email.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

Our G-Cloud service provision is deeply committed to fighting climate change, recognizing the urgent need for collective action to address environmental challenges. Here's how our services deliver against this social value theme:

Environmental Sustainability in Operations:

We prioritize running efficient operations to reduce emissions and minimize environmental impacts. This includes implementing energy-efficient practices, optimizing resource usage, and adopting renewable energy sources wherever possible within our data centers and infrastructure.

Promoting Sustainable Practices:

VE3 actively engages with our suppliers and clients to promote sustainable business practices. Through our services, we advocate for the adoption of environmentally friendly technologies, responsible sourcing, and waste reduction strategies, thereby reducing carbon footprints across the supply chain.

Responsible by Design Framework:

Our G-Cloud services adhere to a 'Responsible by Design' framework, ensuring that environmental considerations are integrated into the development and deployment of digital solutions. By prioritizing environmental protection and minimizing negative impacts, we strive to deliver sustainable outcomes for our clients.

Training and Education:

VE3 invests in training and education programs focused on environmental sustainability. Through initiatives like the Sustainability Quotient (SQ) training, we equip our teams with the knowledge and skills to adopt climate-smart behaviors and implement environmentally conscious practices in their work.

Community Engagement:

We actively engage with communities to support environmental objectives and promote climate action. By partnering with local organizations and stakeholders, we contribute to initiatives aimed at addressing climate change, such as tree planting programs, clean energy projects, and environmental education campaigns.

Covid-19 recovery

Our G-Cloud service provision plays a crucial role in supporting the COVID-19 recovery effort by facilitating resilience, adaptation, and innovation in the face of unprecedented challenges. Here's how our services contribute to the recovery process:

Remote Work Enablement:

VE3's digital solutions empower organizations to transition to remote work seamlessly. By providing secure and reliable cloud-based infrastructure, collaboration tools, and remote access solutions, we enable businesses to maintain productivity while ensuring the safety and well-being of their employees.

Business Continuity Planning:

We assist organizations in developing and implementing robust business continuity plans to mitigate disruptions caused by the pandemic. Our services include data backup and recovery solutions, disaster recovery planning, and resilience testing to ensure operational continuity in the face of unforeseen events.

Digital Transformation Acceleration:

VE3 accelerates digital transformation initiatives to help organizations adapt to the new normal. By modernizing legacy systems, implementing cloud-based technologies, and digitizing processes, we enable businesses to optimize efficiency, improve agility, and remain competitive in a rapidly evolving landscape.

Healthcare Support Solutions:

We provide specialized healthcare support solutions to assist frontline workers and healthcare organizations in responding to the COVID-19 crisis. This includes telemedicine platforms, patient management systems, and data analytics tools to enhance patient care, streamline operations, and support decision-making processes.

Economic Stimulus through Innovation:

VE3 fosters innovation and entrepreneurship to stimulate economic recovery in the aftermath of the pandemic. Through our G-Cloud services, we support startups, small businesses, and enterprises in developing and deploying innovative solutions that address emerging challenges, create new opportunities, and drive economic growth.

Tackling economic inequality

We recognize the importance of tackling economic inequality and are committed to leveraging our G-Cloud service provision to address this pressing social issue. Here's how our services contribute to tackling economic inequality:

Access to Affordable Technology:

We strive to make cutting-edge technology accessible and affordable to all, regardless of economic status. By offering scalable and cost-effective cloud-based solutions, we enable organizations, including small and medium-sized enterprises (SMEs) and underserved communities, to access the tools and resources they need to compete in the digital economy.

Skills Development and Training:

VE3 invests in skills development and training programs to empower individuals with the knowledge and expertise needed to thrive in the digital age. Through initiatives like online courses, certifications, and workshops, we equip people from diverse backgrounds with the skills required for high-demand roles in technology and innovation, thereby enhancing their employability and economic prospects.

Support for Minority-Owned Businesses:

We actively support minority-owned businesses and entrepreneurs by providing access to mentorship, networking opportunities, and resources to help them grow and succeed. Through initiatives like supplier diversity programs and partnerships with minority business organizations, we promote inclusion and diversity in the technology sector and contribute to creating more equitable economic opportunities.

Digital Inclusion Initiatives:

VE3 is committed to promoting digital inclusion and bridging the digital divide by ensuring that everyone has access to essential digital services and technologies. We collaborate with governments, nonprofits, and community organizations to implement initiatives such as digital literacy programs, affordable internet access schemes, and community technology centers, thereby empowering underserved populations and promoting economic equity.

Fair and Transparent Procurement Practices:

We adhere to fair and transparent procurement practices to create opportunities for businesses of all sizes and backgrounds to participate in government contracts and procurement processes.

Equal opportunity

We recognize the importance of tackling economic inequality and are committed to leveraging our G-Cloud service provision to address this pressing social issue. Here's how our services contribute to tackling economic inequality:

Access to Affordable Technology:

We strive to make cutting-edge technology accessible and affordable to all, regardless of economic status. By offering scalable and cost-effective cloud-based solutions, we enable organizations, including small and medium-sized enterprises (SMEs) and underserved communities, to access the tools and resources they need to compete in the digital economy.

Skills Development and Training:

VE3 invests in skills development and training programs to empower individuals with the knowledge and expertise needed to thrive in the digital age. Through initiatives like online courses, certifications, and workshops, we equip people from diverse backgrounds with the skills required for high-demand roles in technology and innovation, thereby enhancing their employability and economic prospects.

Support for Minority-Owned Businesses:

We actively support minority-owned businesses and entrepreneurs by providing access to mentorship, networking opportunities, and resources to help them grow and succeed. Through initiatives like supplier diversity programs and partnerships with minority business organizations, we promote inclusion and diversity in the technology sector and contribute to creating more equitable economic opportunities.

Digital Inclusion Initiatives:

VE3 is committed to promoting digital inclusion and bridging the digital divide by ensuring that everyone has access to essential digital services and technologies. We collaborate with governments, nonprofits, and community organizations to implement initiatives such as digital literacy programs, affordable internet access schemes, and community technology centers, thereby empowering underserved populations and promoting economic equity.

Fair and Transparent Procurement Practices:

We adhere to fair and transparent procurement practices to create opportunities for businesses of all sizes and backgrounds to participate in government contracts and procurement processes.

Wellbeing

Environmental Sustainability:

We are committed to environmental sustainability as a core component of wellbeing. By prioritizing eco-friendly practices, resource conservation, and carbon reduction efforts in our operations and services, we contribute to creating a healthier and more sustainable environment. We prioritize the wellbeing of individuals and communities in all aspects of our G-Cloud service provision. Here's how our services contribute to enhancing wellbeing:

User-Centric Design:

VE3 designs our G-Cloud services with a user-centric approach, prioritizing usability, accessibility, and intuitive design. By focusing on the needs and preferences of users, we create digital experiences that enhance overall wellbeing by reducing frustration, stress, and cognitive load.

Health and Safety Protocols:

We implement robust health and safety protocols to protect the wellbeing of employees, clients, and partners. This includes adherence to strict security standards, data privacy regulations, and compliance with industry best practices to ensure the safety and integrity of our digital infrastructure and services.

Promotion of Work-Life Balance:

VE3 recognizes the importance of work-life balance in maintaining overall wellbeing. Through our G-Cloud services, we enable remote work, flexible scheduling, and collaboration tools that empower individuals to achieve a healthy balance between their professional and personal lives, leading to greater job satisfaction and wellbeing.

Mental Health Support:

We prioritize mental health support for our employees and clients by offering resources, programs, and initiatives aimed at promoting mental wellbeing. This includes access to counseling services, mindfulness training, stress management workshops, and employee assistance programs designed to support individuals in times of need.

Community Engagement and Social Impact:

VE3 actively engages with communities to address social determinants of health and promote holistic wellbeing. Through partnerships, philanthropic initiatives, and volunteer efforts, we support local organizations and projects focused on improving access to healthcare, education, housing, and other essential services that contribute to overall community wellbeing.

Pricing

Price
£175 to £850 a unit
Discount for educational organisations
Yes
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at prime@ve3.global. Tell them what format you need. It will help if you say what assistive technology you use.