Microsoft Fabric Solutions for Enhanced Public Sector Services
BCN provide the Development, Improvement & Management of Fabric Solutions for Public Sector organisations.
Whether you're looking for Reporting & Visualisation of your data, or deep BI, Analytics or Machine Learning solutions, BCN can help you transform services with Fabric, enabling data-driven decision-making for improved insight from your data
Features
- OneLake: Centralised SaaS Data Lake for data processing
- Unified data platform connecting disparate data sources
- Data warehouse: Structure & Process Data
- Power BI visualizations for real business insights
- Use data to drive decisions using Power BI analysis
- Data science: Using AI tools to improve insights.
- Data Engineering: Organise and analyze large volumes of data
- Business intelligence: Turn Data into Decisions with Power BI
- Integration with existing systems & centralise data for analysis
- Tailored Microsoft Fabric Solutions for public sector services
Benefits
- Professional Services or Managed Service engagements
- Partner with proven data-services skills in the Public Sector
- A single data platform from ingestion to insight analytics
- Expert resources without the hiring headache
- Data-driven decision-making capabilities
- Reduce costs through data-driven optimizations
- Put data at the fingertips of your Users
- Enhance data security and privacy measures
- Stay ahead in service provision with innovative analytics solutions
- Advice on strategic & tactical approaches to Data Development
Pricing
£1,250 a unit
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
3 1 7 0 6 8 0 8 3 6 2 2 4 0 2
Contact
BCN Group Ltd
Mr Ric Kelly
Telephone: 0345 095 7000
Email: ric.kelly@bcn.co.uk
Service scope
- Software add-on or extension
- Yes
- What software services is the service an extension to
- Microsoft Fabric
- Cloud deployment model
- Public cloud
- Service constraints
- Services are constrained only by the limitations of the Microsoft Fabric Platform & the associated services
- System requirements
-
- Relevant Fabric Licensing
- Suitable Internet Connectivity
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Depending on Service Purchased Options: Standard Support Hours - Monday - Friday 08:00 - 18:00Hrs Extended Support Hours - Monday - Friday 07:00 - 19:00Hrs Out of Hours Support - P1 ONLY - 24/7 (Excluding Christmas Day) Priority 1: Standard / Extended Hours - Response Within 30 minutes Priority 1: (Out of Hours) Response Within 60 minutes Priority 2: Standard / Extended Hours – Response Within 2 hours Priority 3 or 4: Standard / Extended Hours – Response Within 4 hours Priority 5: Standard / Extended Hours – Response Within 4 hours
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Comprehensive Account Management & Support options Availability of the Fabric Platform is inherited via Microsoft
Support Hours 50+ dedicated support engineers across 3 UK offices provide technical support 24 hours a day, 7 days a week, 365 days a year. * This includes proactive monitoring and alerting of core services. *Waking Hours = 7am to 7pm Monday to Friday (from manned helpdesk) Ticket Severity All tickets logged to the Service Desk will be allocated a severity level based on the following methodology. This will ensure that reporting on service levels may be achieved to the optimum format. 1 - Catastrophic business disruption 2 - Severe business disruption or user critical issue 3 - Business disruption or multiple user issue 4 - Minor business disruption or user issue 5 - Job or Task Service Desk Staff will evaluate the Incident and allocate a priority level after which it will be assigned to the appropriate staff. This will be based on the required skill set to resolve the incident in a timely manner.
As a Microsoft Tier-1 CSP BCN will escalate issues to Microsoft as required for additional support. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- For all Fabric Solutions BCN will engage with the customer to identify business requirements & the optimal solution required. Whether that is a migration to Fabric from other data stores or development of an existing solution, BCN will guide from start to finish. BCN follow the below methodology for delivering projects: Define The first step is always information. We take the time to understand your business. Build We build on our research. Your solution is designed to leverage the insights we learn. Deliver We only ever deliver once we're completely happy and fully tested. Evolve Digital solutions don't stop, they evolve. Metrics & analytics keep pushing you forward.
- Service documentation
- Yes
- Documentation formats
-
- Other
- Other documentation formats
- Microsoft Word
- End-of-contract data extraction
- Continuity of service is important to us for our customers. All customer data is hosted in the customer's tenant & therefore is fully owned by the customer. At the end of any contracted engagement the customer will control the data within the customer's environment & BCN access will be removed as necessary.
- End-of-contract process
- At the end of any contracted engagement BCN will support handover of any solution to the customer. BCN will remove access to all systems as necessary & terminate any support for services.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- No feature differences. Layouts will auto adapt dependent on screen configuration.
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- Description of service interface
- Users can access Fabric Services through the Microsoft Fabric Portal: https://app.fabric.microsoft.com/
- Accessibility standards
- WCAG 2.1 AA or EN 301 549
- Accessibility testing
- Microsoft are responsible for Web Interface testing
- API
- No
- Customisation available
- Yes
- Description of customisation
- Complete customization is available within the boundaries of the Fabric Development Framework & other Microsoft Cloud Services. BCN will complete works based on the agreed design.
Scaling
- Independence of resources
- Independence of resources is provided by Microsoft using logical tenant isolation. Multiple forms of protection have been implemented throughout Microsoft Fabric to prevent customers from compromising Microsoft Fabric services or applications or gaining unauthorized access to the information of other tenants or the Microsoft Fabric system itself, including: Logical isolation of customer content within each tenant for Microsoft Fabric services is achieved through Microsoft Entra authorization and role-based access control.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Native Fabric usage metrics & measures. Others can be developed on request
- Reporting types
-
- API access
- Real-time dashboards
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Microsoft
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Data is kept in standard data formats and can be extracted at any time by the customer using standard Microsoft or other products.
- Data export formats
-
- CSV
- Other
- Other data export formats
- Other supported Power BI Data Formats
- Data import formats
-
- CSV
- Other
- Other data import formats
- Other support Power BI Data Formats
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
Availability of the Fabric Service is leveraged from Microsoft. Service availability <99.9% results in service credits being provided by Microsoft.
Fabric can be built for higher availability, & BCN will design solutions to meet the required customer availability requirements
Microsoft SLAs can be found here - https://view.officeapps.live.com/op/view.aspx?src=https%3A%2F%2Fwwlpdocumentsearch.blob.core.windows.net%2Fprodv2%2FOnlineSvcsConsolidatedSLA(WW)(English)(April2024)(CR).docx&wdOrigin=BROWSELINK - Approach to resilience
- Microsoft Fabric runs on Microsoft's Azure infrastructure. Microsoft ensures that the baseline infrastructure and platform services are available. BCN can design for further resiliency as required for the solution, depending on requirements. Power BI, now a part of the Fabric, has a solid disaster recovery system in place and offers the following features: BCDR as default. Cross-region replication: Power BI uses Azure storage geo-redundant replication and Azure SQL geo-redundant replication to guarantee that backup instances exist in other regions and can be used. This means that data is duplicated across different regions, enhancing its availability, and reducing the risks associated with regional outages. Continued services and access after disaster: Even during disruptive events, Power BI items remain accessible in read-only mode. Items include semantic models, reports, and dashboards, ensuring that businesses can continue their analysis and decision-making processes without significant hindrance.
- Outage reporting
- Public Dashboard & Emails
Identity and authentication
- User authentication needed
- Yes
- User authentication
- 2-factor authentication
- Access restrictions in management interfaces and support channels
- Entra ID provides RBAC controls into customer Fabric environments to restrict access to named resources. Following a least-privilege principle access is controlled via the Entra ID of the customer & other network restrictions based on the solution.
- Access restriction testing frequency
- At least once a year
- Management access authentication
- 2-factor authentication
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- SGS
- ISO/IEC 27001 accreditation date
- 25/06/2020
- What the ISO/IEC 27001 doesn’t cover
- BCN Group activities related to the provision of this service are covered by ISO 27001
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Organisation chart available on request. Upon induction, staff handbook, policies and procedures are provided. Specific IG policies around Information Security which are also in the staff handbook are included. We are also fully compliant with GDPR guidelines. Ongoing documented review to ensure policies are being followed as well as one-to-one systems to enforce policy processes.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Change requests are raised by the customer or on their behalf by our support team. These are submitted to the change team for review and what-if analysis, the results of which are communicated back to the change owner for review of potential impacts and technical feedback before authorising and scheduling in the work. Upon completion and validation that the change has been successful, relevant documentation and parties are updated accordingly. The Change Advisory Board meet regularly to assess the whole change life-cycle to ensure that safeguards and security remain at the forefront of any changes made.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- Production assets are scheduled for daily, automatic scans with the most recent vulnerability signatures. The results of these scans are collected in a secure, central storage service, and automated reporting makes results available to service teams. Service teams review scan results that report aggregate scan results to provide comprehensive reporting and trend analysis. When vulnerability scans indicate missing patches, security misconfigurations, or other vulnerabilities in the environment, service teams use these reports to target the affected components for remediation. Vulnerabilities discovered through scanning are prioritized for remediation based on their (CVSS) scores and other relevant risk factors - https://learn.microsoft.com/en-us/compliance/assurance/assurance-vulnerability-management
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- Protective Monitoring is provided by Microsoft for Fabric Services. "Microsoft cloud services are continuously monitored for signs of compromise. In addition to automated security monitoring and alerting, all employees receive annual training to recognize and report signs of potential security incidents. When suspicious activity is detected and escalated, Service-specific Security Response teams initiate a process of analysis, containment, eradication, and recovery" More information can be found here https://learn.microsoft.com/en-us/compliance/assurance/assurance-incident-management
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- BCN's Incident Management process: Upon detection of an incident either internally or by report (telephone/email/portal) it is classified due to its impact and the number of users it affects. Where required, an escalation event is then created triggering the assignment of a Major Incident Manager, re-assignment of technical resource and team leader to provide client updates. Updates are provided throughout a major incident (P1) with an incident report provided within 1 week. Root cause analysis undertaken after the incident has been resolved to help mitigate the likelihood of recurrence. Microsoft's Incident Management processes for infrastructure incidents are found here: https://learn.microsoft.com/en-us/compliance/assurance/assurance-incident-management
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
BCN are focussed on improvements in Energy Efficiency. We continue to monitor and review our energy usage with the aim of reducing where we can.Tackling economic inequality
BCN will create employment and educational opportunities for people from backgrounds that typically find it hard to get employment.Equal opportunity
BCN is committed to achieving a working environment which provides equality of opportunity and freedom from unlawful discrimination on the grounds of race, gender, gender reassignment, maternity, marital status, disability, religious beliefs, age or sexual orientationWellbeing
BCN is committed to the protection and promotion of the mental health and wellbeing of all staff.
We shall continuously strive to improve the mental health environment and culture of the organisation by identifying, eliminating, or minimising all harmful processes, procedures and behaviours that may cause psychological harm or illness to its employees.
Pricing
- Price
- £1,250 a unit
- Discount for educational organisations
- Yes
- Free trial available
- No