BI Advantage Data Integration Service
Provide a configurable data integration service using the QuantumPM BI Advantage Toolset with Microsoft Cloud Solutions as the backbone.
Features
- Provide a usable data model to enable management information tools
- Configure how mass data are mapped to usable information sources
- Provides a method for combining data from multiple entities/sources
- Provide a clear map for integrated data sources
- Enables data from spreadsheets to be linked to structured systems
- Configure data transformations and mappings
- Minimise custom integrations and need for development support
Benefits
- Usable, fast-changing data models for staff, management and leadership teams
- Clear mapping of data integration, zero mystery of data sources
- Avoid manually stitching data sources together
- Avoid hard to maintain, point to point custom data integrations
- Increase speed of production, quality and reliability of management information
- Remove reliance on single point of failure, expensive operation systems
- Enable the right tool for each application, combine data needed
- Manage data integration rather than cope with it
Pricing
£5,000 to £100,000 an instance a year
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
3 1 9 6 3 4 6 5 5 6 1 5 1 9 8
Contact
Deep Team
David Dunning
Telephone: 07767803540
Email: info@deepteam.co.uk
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- Microsoft Azure, Power Platform
- Cloud deployment model
-
- Public cloud
- Private cloud
- Service constraints
- Not Applicable
- System requirements
-
- Web Browser
- Azure
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
It depends on the query - 4-8 hours. Please see service document for details. (QPM Support Service Level Agreement)
Please note users can manage status and priority of support tickets if registered within the client helpdesk system, and some clients have set up to send us ticket data from their system and access their system, - User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Please see the related services document including QPM Support Offerings.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Please see the services document for "Getting Started" services.
- Service documentation
- Yes
- Documentation formats
- HTML
- End-of-contract data extraction
- Not applicable. The data resides within a client owned data platform.
- End-of-contract process
-
It depends. Any services related to end of contract are determined in planning the end of contract.
No end of contract services are included in the service pricing. These can be purchased as required.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Different services
- Service interface
- No
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- API
- Yes
- What users can and can't do using the API
- The solution is a data integration solution. Please see List of BIA Connectors 2020 included in the services document
- API documentation
- Yes
- API documentation formats
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
The BI Advantage toolset is an integration tool which users are meant to apply to their own business scenarios. Quantum PM can add more connectors as part of a related service.
All service customisation request can be considered case by case and is available however most activities are better characterised as configuration.
Connectors provide access to/from data and events in external systems:
Quantum PM has an existing library of many connectors that can be configured.
New connectors can be configured in a matter of days.
Through connectors various functions can be performed:
Target system object monitoring/consumption or creation. Examples
Document Generation and posting in Office365
Document monitoring and use as data sources from Office365
All service customisation request can be considered case by case.
Dashboards show activity, status, data from integrated cross-system data.
Dashboards also provide mechanisms to trigger actions within and across systems.
Common Application Add-Ins to expose data visibility, functionality, etc from within common applications (for example MS Word, Excel, PowerPoint, Teams, as well as the Web versions of each of the previous applications).
Business Logic (for Aggregation, Quality Monitoring, Human Process interaction, Reporting, data collation, data marshalling for performance reasons)
Scaling
- Independence of resources
-
The solution is based on the Microsoft Azure.
Each customer environment is dedicated, isolated from all others.
Azure Active Directory is used for identity and access management
Azure resources are provisioned as necessary however there are scaling thresholds that can increase performance (for an increase in cost). Performance can be Impacted by load (transaction volume/frequency, data volumes etc)
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Azure provides metrics used for internal monitoring.
Reports can be provided for traffic volumes, data sizes, and all accesses over time (as additional services)
Regular reports, 3rd Party Reporting tools, Auto-Generated Documents, Web-based interactive Dashboards, Emails with or without attachments, posts to systems integrated with Connectors. - Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra support
- Organisation whose services are being resold
- QuantumPM
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
- Other
- Other data at rest protection approach
- This is controlled by Microsoft as the solution is in Azure.
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
-
Not applicable. This is a data integration service.
Exports are done as configured datasets/documents for specific consumption uses and distributions (i.e. auto-generated documents and/or emails or pushes to other systems) - Data export formats
-
- CSV
- ODF
- Other
- Other data export formats
-
- Please see list of Connectors included in the service document
- Word
- Excel
- Data import formats
-
- CSV
- ODF
- Other
- Other data import formats
-
- This is a data integration solution - any format
- Please see list of standard connectors in the service document
- 3rd party APIs
- Web protocols
- Document formats (xml, MS Word / Excel / Project, etc)
Data-in-transit protection
- Data protection between buyer and supplier networks
- Other
- Other protection between networks
- Not applicable - the solution is contained within the client Azure service from Microsoft
- Data protection within supplier network
- Other
- Other protection within supplier network
- The solution is based on Azure. This is determined by Microsoft, it is not a question for the BI Advantage Supplier.
Availability and resilience
- Guaranteed availability
-
See Microsoft as the solution is based in Azure.
QPM’s SLAs are based on core cloud infrastructure availability. An example core cloud provider is Microsoft: https://azure.microsoft.com/en-Us/support/legal/sla/cloudservices/v1_5/ - Approach to resilience
- See Microsoft Azure
- Outage reporting
- Not applicable - see Azure
Identity and authentication
- User authentication needed
- Yes
- User authentication
- 2-factor authentication
- Access restrictions in management interfaces and support channels
- The BI Advantage interfaces have role-based security models.
- Access restriction testing frequency
- Less than once a year
- Management access authentication
- 2-factor authentication
Audit information for users
- Access to user activity audit information
- No audit information available
- Access to supplier activity audit information
- No audit information available
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
-
Azure tracks/logs all access and provides security monitoring across the infrastructure and for each instance. Access to the instances (human and programmatic) is done via standard Azure authentication mechanisms and is locked to specific IPs.
Within Databases, individual logins are tracked and logged. - Information security policies and processes
-
Built in Microsoft Azure
Compliance with standards such as: ISO/IEC 27001 and ISO/IEC 27018, FedRAMP, and SOC 1 and SOC 2
Additional compliance by industry and region
Data is always encrypted in-flight and at-rest during transactions.
Data is retained only in SQL Azure instances (optionally encrypted) and accessible only via specific IPs and accounts.
QPM Service/Support Access is only by named individuals with background checks.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Common Infrastructure changes (across tenants) – are rolled out and tenants are moved to the new common infrastructure on an individual basis. Tenants can be moved back to previous infrastructure if needed.
Tenant Specific changes/configurations are made via updates within each tenant. The history of updates is maintained for the tenant and can be rolled back.
Updates are coordinated with the Client.
Multiple instances for a Tenant (i.e. Production, Test, Dev). Configurations (connectors, dashboards, common application add-ins, business logic) are isolated by instance. Each instance is maintained/accessed independently. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- BI Advantage relies on / resides within Microsoft Azure, so please refer to Microsoft.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- BI Advantage relies on / resides within Microsoft Azure, so please refer to Microsoft.
- Incident management type
- Supplier-defined controls
- Incident management approach
-
Users report incidents via phone or email. We recommend this is through the users help desk. Incident reports are provided via email.
Please see QPM Support Offerings and Service Level agreement in the services document.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
- Other
- Other public sector networks
- Microsoft Cloud / Azure (private or public)
Social Value
- Fighting climate change
-
Fighting climate change
We are actively working to deliver against the Social Value themes. As part of our project delivery, we are working with our customers to plan the delivery in a manner that supports social values and also to deliver outcomes that drive social value wherever possible. For example, we are aiming to deliver outcomes that reduce un-necessary travel and work remotely where this is feasible. - Covid-19 recovery
-
Covid-19 recovery
We are actively working to deliver against the Social Value themes. As part of our project delivery, we are working with our customers to plan the delivery in a manner that supports social values and also to deliver outcomes that drive social value wherever possible. - Tackling economic inequality
-
Tackling economic inequality
We are actively working to deliver against the Social Value themes. As part of our project delivery, we are working with our customers to plan the delivery in a manner that supports social values and also to deliver outcomes that drive social value wherever possible. - Equal opportunity
-
Equal opportunity
Deepteam works with associates and directors who can meet client needs. This is not determined by ethnicity, gender or anything other than capability. We are actively working towards delivering products and outcomes in line with Social Value themes. - Wellbeing
-
Wellbeing
Deepteam works with associates and directors who work hard but are at a level of professionalism and maturity that means they are in a position to work in a manner that supports the wellbeing of everyone involved.
Pricing
- Price
- £5,000 to £100,000 an instance a year
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- It depends on the scenario - but full versions are available.