Data Platform Software
We design, build, and manage data platform capabilites using full stack cloud technologies that we customise and optimise to meet our client needs. We are technology agnostic, meaning we are experts across a range of technologies including Azure, AWS, Databricks, GCP, Github, and have experience operating in secure environments.
Features
- Full Stack Data Platform
- Data Ingestion process linked to existing databases via API
- ETL to manage and organise data
- Data Quality Automation
- Single Source of Truth data repository
- Self service data analytics capability
- Predictive modelling based on accurate data sets
- Curated data sets for reporting and analytics
- Visualisations to display descriptive and predictive metrics
Benefits
- Business Insights delivered rapidly and incrementally
- Highly customisable to suit the needs of our client
- Scalable capability utilising benefits of cloud
- Vendor neutral, reducing licensing commitment
- We build on your existing capability and data maturity
- Data Platform links to your business processes for enhanced efficiency
Pricing
£20,000 to £1,000,000 a unit
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
3 3 9 7 8 1 0 7 5 3 2 4 4 9 4
Contact
OAKLAND GROUP SERVICES LIMITED
Phil Bent
Telephone: 0113 2341944
Email: tenders@weareoakland.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- The services we build revolve around public cloud constraints (e.g. AWS/ Azure/ GCP) where any service restraint is limited to budget constraints by the client (depending on scaling capability required).
- System requirements
-
- Our Data Platform operates across a blend of cloud software
- Our Data Platform depends on publicly available cloud hosting technologies
User support
- Email or online ticketing support
- Yes, at extra cost
- Support response times
- As standard we do not cover weekend support, however this can be discussed and options provided.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- No
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
We provide the following levels of on site support dependent on the nature of the issue:
Principal Consultant/Technical Account Manager: £1,400/ day;
Snr Consultant/Cloud Engineer: £1,200/ day;
Mid Consultant/Cloud Engineer: £1,050/ day;
Jnr Cloud Engineer: £860/day. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We work alongside our clients during the development of the Data Platform capability. Our approach is to 'work with' and 'not to' our clients, meaning we work alongside and upskill them as we build the bespoke service for them. This ensures users become aware of the functionality and how to access the service as it develops. We also provide user documentation and onsite training as needed to ensure our clients gain the full benefit of the capability.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
-
We work with our clients to set up a tenancy with a major vendor of their own (AWS/ Azure/GCP etc.). We then develop the Data Platform capability to meet their needs. When the contract ends with us, the client owns their data which is hosted by the chosen vendor.
Should the client end the contract with that vendor, they can extract the data via a number of means, for example cloud-to-cloud transfer, download to local storage. This can be done both manually or via an API gateway as needed. - End-of-contract process
-
At the end of a contract with us, we will have delivered a data platform capability in agreement with our clients needs and have provided detailed documentation on how to operate and manage the capability.
At an additional cost we can also provide a support function to help maintain and support its development as new use cases come to light.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Linux or Unix
- MacOS
- Windows
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Yes our services can be used on mobile devices. Due to the varied nature of our data platform offering there may be some differences between mobile and desktop services, however core functionality will be provided on mobile services.
- Service interface
- No
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- API
- Yes
- What users can and can't do using the API
-
Users can use an API to link data from their current databases to transfer them across to the data platform. Through this means we are able to combine multiple data sources, assess them, apply data quality checks, and provide a single source of truth.
Users are also able to access that single source of truth via APIs to link the trusted data source back to other tools, such as reporting or management tools.
We will customise the API to meet a clients needs as part of the build we provide. - API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- ODF
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
Customisation is possible. A key driver to our data platform service is to ensure business value is generated from the service.
We know that business requriements (use cases) do not stand still, and as a result the data platforms we provide need to adapt to meet the ever changing need.
We can support users to customise their data platform, or we can provide the training to enable them to make changes to meet their future needs.
Scaling
- Independence of resources
- We use public cloud technologies, and as such they are able to scale to meet the needs of our clients. In the context of Government clients, we would draw on existing cloud capabilities available to them to meet the needs of the data capability we've provided.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
We will tailor a Data Platform to meet the needs of our clients. As such we can provide usage metrics in a full variety of formats to meet client needs.
This can help indicate the RoI of a platform (cost v benefit) and also help generate true business benefit of the capability.
Service metrics can be provided by all of the options as highlighted below. - Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Microsoft Azure, AWS, Starburst, DataBricks
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
- Physical access control, complying with CSA CCM v3.0
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
-
Our clients will be able to access their data via dashboards created as part of the data platform to obtain Business Intelligence.
Our clients will be able to export bulk data via any means available with the chosen cloud vendor of choice - e.g. manual download, AWS Physical Data Transfer, Azure Data Export Service. - Data export formats
-
- CSV
- ODF
- Other
- Other data export formats
-
- JSON
- XML
- Data import formats
-
- CSV
- ODF
- Other
- Other data import formats
-
- JSON
- XML
- RDF
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- We have a standard set of SLA depending on priority of the nature of the incident raised. These are as follows: Severity S1 - Target Resolution: 8 hours (1 working day); Severity S2 - Target Resolution: 24 hours (3 working days); Severity S3&S4 - Target Resolution: 40 hours (5 working days). SLA resolution times can be adjusted based on the specific support package that is used. The underlying platform SLAs are provided by the specific vendor that supports our Data Platform.
- Approach to resilience
- We design resiliency into our data platforms following industry best practice; for example we follow MS Azure resiliency checklists https://docs.microsoft.com/en-us/azure/architecture/checklist/resiliency-per-service
- Outage reporting
- Dependent on the need of our client, we would normally set outage reporting via API and email alerts.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Access restrictions in management interfaces and support channels
- IAM approach
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Lloyds Register
- ISO/IEC 27001 accreditation date
- 25/06/2020
- What the ISO/IEC 27001 doesn’t cover
- Nil
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
Internally we ensure our Information Security Policies and processes are followed through mandatory training.
All projects are also reported on weekly, any security incidents are highlighted immediately, triaged by the IS manager and escalated as required. For example this could be escalated for the security team to manage and investigate (including board level support) - further escalation (to third parties e.g. NCSC) would be actioned as appropriate.
Security management (monitoring) is reported to the Board on a monthly basis, and we have a centralised logging and management system in process to manage SIEM across our internal network.
Where we work in a clients tenancy, we will follow their security management practices as appropriate.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
We typically conduct configuration and change managment through 3 separate environments: development, test, and live.
Only once a product has been developed and tested (including security testing) will it then be introduced into the live environment, to ensure only the benefits of the product are seen without any issues to the live environment.
We employ robust version control on our products, and ensure each stage of a product's lifecycle is indicated such that full visibility is seen, and should issues occur the ability to quickly revert to previous versions is possible.
In addition, details of changes are also documented. - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
Dependent on clients needs, we will conduct vulnerability testing on our products, but as standard will ensure we follow OWASP and industry best practice.
We utilise Microsoft Defender and Sentinel to monitor and manage vulnerabilities and manage incidents across all the software products we manage and provide.
Microsoft Threat management and analytics enable us to become aware of threats as they are published and mitigate them promptly, for example through software configuration change or patch management. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
We utilise MS Sentinel, MS Defender, and Defender for Cloud to monitor all our systems and services.
These capabilites allow us to identify potential compromises, stop attacks before they happen, and quickly respond to potential incidents. - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
Any event that affects the Confidentiality, Integrity, or Availability of Data Platform we support will trigger our incident response cycle: Detect, Analyse, Contain, Remediate/Eradicate, Recover.
The project team responsible for the platform will manage initially, but will draw upon wider resources as needed (security manager, developer team, PR team, Board members etc.) .
Users are able to report incidents either directly with the project team (by phone or email), via our helpdesk, or by contacting Oakland direct.
We provide an initial triage report within 24 hrs and a full report within 72 hrs of completion of the incident.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
At Oakland, we embrace our environmental responsibility with our Green Ops framework. Building on Fin Ops principles, Green Ops equips data delivery teams to manage and reduce their environmental impact, and is an action-orientated approach, based on a four-stage lifecycle which enables continuous improvement. 1. Display: use data to build a holistic view of impact 2. Diagnose: analyse intensity areas 3. Decide: craft actionable plans based on diagnostics 4. Deliver: execute and monitor. As a minimum, we will utilize Green Ops for all projects undertaken by Oakland. Green Ops is data-led. We will define clear metrics that attribute environmental impact to data activity (e.g. cloud subscriptions or data projects). We propose these to include, but not be limited to: • Cloud and on-premise resource consumption (compute / storage) • Energy consumption (kWh) • Energy carbon intensity (kg/Co2) • Activity scale (e.g. no. of production solutions and services, total live projects) Supplementing these metrics with more dimensions such as time-periods and user groups will create a granular view of impact. Environmental measures must be analysed and visualised to drive Green Ops execution, either via existing dashboards or standalone reports. If preferred, we can deploy pre-created Power BI Green Ops dashboards which can be rapidly configured. Oakland have built these (and the supporting data platform) as part of our Data Platform Hosting offering.Tackling economic inequality
We ensure our recruitment practices, our culture and the people experience all meet the five principles from the Good Work Plan that will attract good candidates from a diverse range of backgrounds. These include worker satisfaction, good pay, participation and progression, wellbeing, safety and security and voice and autonomy. Values based recruitment, unconscious bias training & fair and consistent recruitment practices. Creating social value through our matched giving scheme and B Corp activities and status.Equal opportunity
We will not tolerate discrimination or harassment, and are committed to promoting equal opportunities in employment. Those who work for us, and anyone applying for a job with us, will receive fair and equal treatment. We ensure, where possible, full access for everyone applying for a vacancy. Decisions about transfers and internal promotions are made, so far as possible, using only objective criteria. We will never victimise anyone who makes a legitimate complaint to us about harassment or discrimination, or who supports a colleague in their complaint. Our futher commitments and aims include: A working environment free from all forms of unlawful discrimination, including victimisation and harassment. A workplace capable of allowing everyone to achieve their greatest potential, and where individuals are willing to give their best. A policy of ensuring employment opportunities are open to all qualified candidates, so that we recruit from the largest possible pool of available talent and recruit the best-qualified staff. A commitment to recruiting based on ability to do the job, that also reflects the multicultural composition of our local community. A commitment to amending our polices and approaches if we think it has become outdated, or circumstances suggest to us that it needs updating. A commitment to protecting staff, wherever possible, from being victimised or treated less fairly if they make or support a complaint in good faith under our policies.Wellbeing
At Oakland, mental health and wellbeing is at the forefront of everything we do and in this ever evolving hybrid world we are constantly looking for ways to support our employees as we adjust to the new ways of living and working. Psychological safety in the workplace is of primary importance and we want our employees to feel safe, valued and heard and secure in the knowledge that they will not be discriminated against for being their true, authentic selves. As part of this support, we also promote diversity and inclusion so everyone feels they can bring their ‘Whole Self’ to work. As a company we make big investments into our wellbeing initiatives and actively engage with our team to allow us to gain their input, improve our benefits and provide the vital support they need to maintain their optimum health and wellbeing. We also have a robust employee assistance programme which includes access to private healthcare, mental health support and therapies and offers a 24 hour support line. We regularly roll out wellbeing training across the business and bring in wellbeing experts to engage with the team and have enlisted Mental Health First Aiders within the organisation. We actively promote healthy lifestyles, positive mental health and share a variety of ways our team can support their own wellbeing and create a healthy work/life balance. We also offer a wide range of company benefits (which include discounted gym memberships and a ‘Cycle to Work’ scheme). We firmly believe that if you look after your staff, your staff will look after you.
Pricing
- Price
- £20,000 to £1,000,000 a unit
- Discount for educational organisations
- Yes
- Free trial available
- No