Microsoft Power BI Data Visualisation
iOCO offer Power BI as a consulting service or available on our Cloud Platform. Power BI is a cloud–based business analytics service that offers fast, easy access to your data, ETL functionality and Reporting, In-depth analyses of data, Insights from any device and allows Collaboration and sharing across your organization.
Features
- Business Intelligence and MI platform
- Interactive Dashboards and visualisations
- Mobile apps for iOS, Windows and Android
- Data catalog and model publication
- Auto refresh of data and dashboards
- Enterprise level reporting and scalability
- Multiple data source connectors
- Built in security
- Easy collaboration and visualisation of data
- Advanced design fearures
Benefits
- Near real time monitoring of information
- Author reports, dashboards and stories using business terminology
- Access data across mobile applications
- Ease of use and self-services
- Slice and dice through hierarchies to find significant insights
- Import data/reports from Excel, CSV and Power BI Desktop files
- Users do not need IT involvement to explore data
- Access embedded AI in Power BI
- Market leading data visualisation tool
- Simple user interface for computer or mobile devices
Pricing
£7.50 to £15.10 a user a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
3 2 4 4 3 7 0 7 0 4 5 1 9 9 0
Contact
IOCO SOLUTIONS LIMITED
Mick Morey
Telephone: 0118 206 2938
Email: michael.morey@ioco.tech
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- Microsoft Dynamics 365 and Custom App Development
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- No constraints.
- System requirements
-
- Users required licenses
- Users need a Web browser
- Server needs connectivity to required data sources
- Server needs connectivity to an authentication provider
- Most system requirements will be local to an implementation
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
IOCO would define an appropriate SLA and response time for each business. Typical support response times:
Severity 1 - 1 Hour,
Severity 2 - 4 hours,
Severity 3 - 8 hours,
Severity 4 - 1 Business Day or as per service catalog - User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
IOCO, has a a 24/7 Service Desk providing a single point of access for all incidents and requests. The service is available via telephone or email. Responses are prioritised and addressed in line with the service levels detailed in the Service Level Agreement document.
All engagements have a named Service Manager for engagement and escalations with a Technical Service Manager who attend service review meetings. - Support available to third parties
- No
Onboarding and offboarding
- Getting started
- Onsite or online training is available for the solution and a Getting started full set of documentation is provided with an online Help Center. iOCO would also provide project-based services to help our customers get their Power BI environments designed and built for purpose.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- ODF
- End-of-contract data extraction
- We are providing a platform as a service with Power BI installed and available for use. All existing and created data in relation to the services iremain the property of the customer. Data will be extracted in an agreed format (CSV, TXT, ELS or other data files) and within agreed timescales as agreed between contracting parties.
- End-of-contract process
- Typically Power BI is offered as a subscription-based service which can either be -renewed or terminated. The customer has the right to backup and restore their specific Power BI content and models for future use.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- There is no functional difference between Power BI on Mobile or Desktop.
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
- API Services are available with Power BI and would vary depending on the requirement of the customer.
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- ODF
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Look and feel (colours/background) of login page, and Welcome (i.e. home) page. Shortcuts may be added to the navigation bar. All customisations will be different for each customer, but Power BI does not have restrictions on how the product can look.
Scaling
- Independence of resources
- The iOCO Cloud and Power BI Analytics platform is high availability by design with 24x7 monitoring to identify any event driven impacts on end user service whilst allowing on demand scaling of compute resources.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Various metrics are available for this offering and toolset.
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Scale, obfuscating techniques, or data storage sharding
- Other
- Other data at rest protection approach
-
The application has been built to vendor requirements, as such there is no OS or DB level encryption beyond user / password access. The application has obfuscated passwords within the databases. There are options available for encryption of data on DB and OS level, though these come with not insignificant performance hits so we would have to consider increasing resource and cost if this was needed. e.g.
PostgresSQL - CyberTec Instance Level Encryption
Centos NFS - Encrypted File System - Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Data can be exported/imported using FTP and/or Secure Gateway into Excel, PDF or CSV files. Report output may be exported in PDF, CSV, XLS or XML formats. Dashboards and Stories can be exported in PDF.
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- .XLS, .XLSX
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- .XLS
- .XLSX
- .TXT
- .ZIP
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- SLA - 99.9% availability. If iOCO service fails to meet this key objective in a given calendar month, 5% of prorated monthly cloud service fee will be refunded directly to the customer account within 30 days.
- Approach to resilience
-
Data Centres have a high resilience setup:
• Highly secure, Tier 4 data centre environment
• Dual power circuits with UPS
• Backup power generators
• Constant environmental monitoring
• Dual network and redundant data fabric
• Software-defined storage services
• Converged and hyper-converged infrastructure
• On-going capacity planning
Application is built upon a containerised architecture. This is able to redeploy services on available hardware if it senses that an issue has occurred. - Outage reporting
- Dependent on customer requirements, outages can be accessed via Public URL, or notified by telephone and/or email alerts.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Username or password
- Other
- Other user authentication
- SAML OATH 2.0 via Customer ADFS server
- Access restrictions in management interfaces and support channels
- The application is multi-tenanted. There is a back office management layer where tenants and users are setup. Application back office administrators are named and limited in number. A back office admin user does not by default have access to a tenant. By adding themselves to a tenant, this account only has very basic permissions to raise new requests and view your own requests only. The tenant admin has access to report on any action taken within their own tenant.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Limited access network (for example PSN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- Between 1 month and 6 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
- INFORMATION SECURITY MANAGEMENT SYSTEM ISO/IEC 27001:2013 for the Datacentre
Security governance
- Named board-level person responsible for service security
- No
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Security is managed at three levels: Infrastructure, Environment, Customer. iOCO Cloud team are wholly responsible for Infrastructure security, governing DC / Hardware, Network and Security devices. iOCO Application Management team is responsible for managing the environment where the application is running - for example building and hardening the application to vendor recommendations. Customer is responsible for in-application security.(e.g. user role access) and the security of on-premise components that maybe required for integration purposes.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- The change management processes follow ISO27001 A.12.1.2 controlled mechanism for making changes to operational environments.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
We subscribe to multiple vendor provided vulnerability
notification services. All vulnerabilities are reviewed and applicable patches are administered through the change control process . Mitigation measures will always be considered first, with critical patches targeted for resolution within 30 days. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
Denial of Service is applied on all Internet links , with Intrusion detection\protection available to customers on request. All security events are logged\notified based on severity. Any attempted platform security compromises are dealt with 24/7 by security engineers. The responsibility remains with the customer to ensure detected intrusions are re-mediated where customershavecontrol,permission,oraccesstomodifytheir service. iOCO recommends that customers follow security best practices including, but not limited to:
• Maintaining effective firewall rules
• Limiting the communication ports to only the necessary, for conducting business
• Locking down access - Incident management type
- Supplier-defined controls
- Incident management approach
- The incident response process complies with industry standards for legally admissible chain-of-custody and forensic data collection management processes and controls. Response standards, procedures, and methods are implemented based on the severity level of an incident. Incident reports are produced as part of standard post incident process and provided to customers on request.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Fighting climate change
-
Fighting climate change
Though we have a relatively low environmental footprint as a provider of professional services, we see effective environmental stewardship as an important aspect of an organisation’s licence to operate. iOCO is committed to playing its role in addressing the challenges climate change presents and addressing the global economy in the areas where we can.
The biggest opportunity we have to increase environmental sustainability is to apply our expertise, resources, research and innovation to create solutions that provide our customers with the technology to improve the efficiency and sustainability of their operations, products and services. iOCO’s work in the digital solutions arena reduces the need for paper and physical transport and, for this reason, supports the environment by reducing the need for fossil fuels and fossil fuel-derived products.
Within the Group, our goal is to minimise our direct impact on the environment by operating our facilities and conducting our activities in ways that reduce energy, water, paper consumption, waste and greenhouse gas emissions. We support and comply with the requirements of current environmental legislation and codes of practice associated with industry-best practices. As far as possible, we purchase products and services that minimise damage to the environment and we aim to minimise waste and prioritise waste reuse or recycling. - Covid-19 recovery
-
Covid-19 recovery
COVID-19 has been a massively disruptive force—it has caused businesses to close, forced people to work from home, accelerated the rate of technological adoption and pressed organisations to reinvent themselves overnight to remain sustainable and survive. It has also exacerbated issues that existed pre-pandemic. Unsurprisingly, business leaders face considerable challenges as they look to the future and re-evaluate how they will move forward to remain competitive and succeed.
The pandemic forced an abrupt shift to remote working, and while businesses are still trying to figure out how people will work in the long term, it is widely predicted that a distributed work environment is here to stay. Digital collaboration has improved immeasurably, and technology has enabled people to connect across countries and time zones.
We are taking active steps to keep our people and our customers safe, whilst prioritising our support for critical services. Our teams are working closely with our key contractors, partners and suppliers to ensure they can continue to support our services for consumers and businesses. - Tackling economic inequality
-
Tackling economic inequality
Over the past three years, iOCO has spent a significant amount of time building an organisation that is future-fit enabled by best-practice GRC systems and processes and a deeply rooted ethical culture.
There has been radical transformation in terms of governance and compliance as a result. With these new policies, measures and controls in place, the EOH/iOCO group has witnessed a fundamental change in the way it is being run and governed under the current leadership. The zero-tolerance approach to unethical behaviour is evidenced in the public stance of the CEO, as well as the extensive actions taken by the leadership team. - Equal opportunity
-
Equal opportunity
iOCO has invested in upskilling our own people and supports gender equality through various initiatives including skills development. iOCO encourages our employees to grow the collective mindset to solve together and supports the people to develop their talents and abilities. This will be executed by creating new initiatives with foresight. The objective of people development is four-fold; employee and Company performance, sustainability, digitisation and consideration to global shifts. The development strategy and programmes are delivered through the Learning Hub. In return, iOCO expects our employees to take ownership to direct their own life and work, have the desire to constantly improve skills through learning and practice and have a sense of purpose in their work and something larger. This creates an ecosystem of autonomy, mastery and purpose and the aim to drive a growth mindset impacting the head, heart and hands. - Wellbeing
-
Wellbeing
iOCO’s ability to create value depends on the quality of the skills we have at our disposal. The technology industry is characterised by rapid evolution and we need to attract, engage and retain top talent, invest in skills development and career progression while supporting balance and quality of life. Ultimately our objective is to attract, develop, reward and retain the best possible talent to drive business success.
We continue to navigate the new reality created by the COVID-19 pandemic. We enhanced our remote working solutions for staff and implemented a slow and gradual reopening of our offices once lockdown eased.
To support our people through these trying times, we introduced a number of wellness initiatives and events aimed at employee wellbeing. Despite the significant volatility in the labour market, we were able to attract experienced talent while retaining existing talent.
Pricing
- Price
- £7.50 to £15.10 a user a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Access to an IBM Cognos Analytics server (North America based) via the public internet. Reporting, Dashboarding, Stories and Data Modelling is included. System administration is excluded. The free trial is for 30-days.