Skip to main content

Help us improve the Digital Marketplace - send your feedback

MAKUTU DOT IO LIMITED

Data Platform

Our tailored Data Platforms encompass Analytics, AI and IoT; supporting End to End data solutions.

Features

  • Professional Services in Data Architecture, Engineering, AI, Visualisation & IoT.
  • Professional Services with regards to Data Mesh implementations.
  • Professional Services with regards to Data Governance.

Benefits

  • Real-Time Analytics & AI Readiness Unlock insights with lakehouse integration.
  • Connected Services Approach – Embed Microsoft Fabric to maximise ROI.
  • Comprehensive Data Governance Build trust with classification, lineage, and policies.
  • Data Mesh Decentralised data ownership with governance.

Pricing

£495 to £1,395 a unit a day

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at james@makutu.io. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

3 5 0 9 2 8 4 4 3 0 6 0 6 1 6

Contact

MAKUTU DOT IO LIMITED James Sumsion
Telephone: 02037971000
Email: james@makutu.io

Service scope

Service constraints
None.
System requirements
None.

User support

Email or online ticketing support
Email or online ticketing
Support response times
Service issues are prioritised on a range of severity from 1 to 4, with a 30 minute and 4 hour response time respectively.
User can manage status and priority of support tickets
No
Phone support
No
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
BRONZE (Basic Support) Applications with minimal reliance on real-time data analytics or IoT operations. Support Team Email only 09:00Hrs-17:00Hrs (UK Local Time) SILVER (Enhanced Support) Applications that require more frequent data insights and IoT support. Support Team with contact point Email Support Portal 09:00Hrs-17:00Hrs (UK Local Time) GOLD (Professional Support) Applications with significant data analytics needs and complex IoT ecosystems requiring proactive management. Dedicated Team with contact point Email Support Portal Online meetings 09:00Hrs-17:00Hrs (UK Local Time) PLATINUM (Enterprise Support) Applications with mission-critical data analytics and IoT needs demanding the highest level of attention and fastest response times. Dedicated Team with contact point Email Support Board Weekly Online Meetings" 24 Hours a day 7 Days a week
Support available to third parties
No

Onboarding and offboarding

Getting started
Regardless of how mature your organisation is in it's Data Journey, Makutu can provide consultancy and discovery days as required, to appropriately scope out pain-points and identify where we fit in. Engaging with a member of our Business Development team will allow us to understand your business requirements and how to begin utilising our services.
Service documentation
Yes
Documentation formats
  • HTML
  • ODF
  • PDF
End-of-contract data extraction
All data belongs to the customer and full support is given to them to ensure data is transferred to them in the format they require.
End-of-contract process
There are no additional costs associated with a contract ending.

Using the service

Web browser interface
Yes
Using the web interface
The interface will be set up according to the customers requirements.
Web interface accessibility standard
None or don’t know
How the web interface is accessible
This will be discussed with the customer and access to the interface will be according to their specification.
Web interface accessibility testing
Assistive technology is provided and in-line with that provided by the Microsoft Azure stack.
API
Yes
What users can and can't do using the API
Makutu provides a service that supports API and Data Contract service Setting Up the Service Through the API Users authenticate by registering and obtaining API keys. Initial settings are configured such as defining data sources and setting up data ingestion pipelines via the API. Integration with existing systems is guided by comprehensive API documentation. Making Changes Through the API Makutu allows API users to update configurations (e.g., data sources, pipeline settings) and manage different versions of data products or pipelines. Schema changes are also possible through the API, provided they adhere to predefined data contracts and pass validation processes. Limitations to Setting Up and Making Changes Data contracts impose certain restrictions, limiting how data is utilised (e.g. data usage in specific environments like development or production only). SLAs may restrict API availability and response times. Additionally, users must ensure that all changes comply with the terms of the data contracts, potentially limiting the scope of modifications they can implement.
API automation tools
OpenStack
API documentation
Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
  • ODF
  • PDF
  • Other
Command line interface
No

Scaling

Scaling available
Yes
Scaling type
  • Automatic
  • Manual
Independence of resources
Makutu services offer elastic scalability through Microsoft Azure, allowing businesses to adjust resources dynamically. Vertical scaling enables increasing computing power by adding CPU, memory, or storage. Horizontal scaling distributes tasks across servers, enhancing scalability and fault tolerance. Azure's elasticity accommodates fluctuating traffic patterns, ensuring consistent performance. With both scaling options, businesses tailor strategies to performance and cost needs. Auto-scaling automates resource adjustments based on metrics. Azure's elasticity spans databases, storage, and networking, supporting holistic infrastructure scaling.
Usage notifications
Yes
Usage reporting
  • Email
  • Other
Other usage reporting
Phonecall

Analytics

Infrastructure or application metrics
Yes
Metrics types
  • CPU
  • Disk
  • HTTP request and response status
  • Memory
  • Network
  • Number of active instances
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
  • Hardware containing data is completely destroyed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Backup and recovery

Backup and recovery
Yes
Backup controls
The service is on a high-availability infrastructure.
Datacentre setup
Multiple datacentres with disaster recovery
Scheduling backups
Supplier controls the whole backup schedule
Backup recovery
Users contact the support team

Data-in-transit protection

Data protection between buyer and supplier networks
Other
Other protection between networks
Security arrangements are discussed on as per customer basis.
Data protection within supplier network
Other
Other protection within supplier network
Data within our network is protected at multiple layers, by a range of techniques baked in to the Microsoft azure technology stack.

Availability and resilience

Guaranteed availability
Our services are provided on the customers tenancy which is covered by Microsoft Azures SLA for online services - https://www.microsoft.com/licensing/docs/view/Service-Level-Agreements-SLA-for-Online-Services?lang=1
Approach to resilience
Available on request
Outage reporting
Specific to customers needs.

Identity and authentication

User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
We implement stringent access restrictions across all management interfaces and support channels. Access to management interfaces, through the Azure Portal, is strictly controlled through role-based access control, ensuring that only authorised personnel have the necessary permissions to perform specific actions. Additionally, multi-factor authentication is enforced to add an extra layer of security. Access is limited to authenticated users with appropriate credentials. We utilise ticketing systems with access controls, ensuring that only designated support personnel can view and respond to customer inquiries or incidents. All access is logged and regularly audited to maintain accountability and compliance with security standards and regulations.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Username or password
Devices users manage the service through
  • Dedicated device on a segregated network (providers own provision)
  • Dedicated device on a government network (for example PSN)
  • Dedicated device over multiple services or networks
  • Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)
  • Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
Other
Other security governance standards
Working towards ISO 27001 accreditation.
Information security policies and processes
Data Encryption: We employ encryption techniques to protect data both in transit and at rest, ensuring confidentiality and integrity. Access Controls: Strict access controls are implemented to regulate who can access sensitive information, with role-based permissions and authentication mechanisms in place. Regular Audits and Monitoring: We conduct regular audits and monitoring of our systems to detect and mitigate security threats promptly. Compliance Frameworks: We adhere to industry standards and compliance frameworks, such as GDPR and ISO 27001, to ensure that our security practices meet regulatory requirements. Incident Response Plan: We have an incident response plan in place to address security incidents effectively, including protocols for notification, investigation, and remediation. Employee Training and Awareness: We provide ongoing training and awareness programs to educate employees about cybersecurity best practices and their role in maintaining a secure environment. Vendor Security Assessments: We conduct thorough assessments of our vendors' security practices to ensure that they meet our standards for information security. Continuous Improvement: We continuously review and improve our security policies and processes to adapt to evolving threats and industry best practices.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
At Makutu, we implement robust configuration and change management processes. This includes detailed documentation of system configurations, version control for code and artifacts, and a Change Control Board for evaluating proposed changes. Changes undergo thorough testing in pre-production environments, with rollback procedures in place. Communication and documentation are prioritised throughout the process. Continuous improvement is integral, with lessons learned informing iterative enhancements. These processes ensure stability, reliability, and security of our systems, enabling us to deliver high-quality solutions while minimising risks and disruptions.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
As a Cyber Essentials Plus certified company, we assess threats through regular risk assessments and vulnerability scans. We deploy patches promptly to mitigate risks. Our threat intelligence comes from industry reports, security advisories, and collaboration with trusted partners.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
When a potential compromise is detected, our incident response team swiftly initiates investigation and containment. Response time varies but prioritizes swift action. We ensure effective communication with stakeholders. Post-incident, we conduct thorough analysis for root cause identification and implement corrective measures. Our goal is to proactively safeguard our Azure environment, adhering to predefined SLAs for incident response, with a continuous focus on improvement.
Incident management type
Supplier-defined controls
Incident management approach
At Makutu, our incident management is guided by pre-defined processes for common events, ensuring swift and effective responses. Users report incidents through multiple channels, including our centralised ticketing system and dedicated email address. Upon receipt, incidents are promptly triaged and assigned to the appropriate teams for resolution. We provide incident reports through our communication channels, detailing the incident timeline, impact, and actions taken for resolution. These reports are shared with relevant stakeholders to ensure transparency and facilitate continuous improvement in our incident management practices.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
No

Energy efficiency

Energy-efficient datacentres
Yes
Description of energy efficient datacentres
Makutu aligns with the EU Code of Conduct for Energy Efficient Data Centres through various strategies.

Firstly, utilising the Microsoft Azure stack which prioritises energy efficiency by integrating technologies such as efficient cooling systems and optimised power distribution.

Secondly, Azure invests in renewable energy sources, such as wind and solar, to power its operations sustainably.

Thirdly, Azure employs energy-efficient hardware and dynamic power management techniques to minimise energy consumption while maximising computing power. Continuous monitoring and optimisation of energy usage further enhance efficiency.

Social Value

Social Value

Social Value

  • Fighting climate change
  • Equal opportunity
  • Wellbeing

Fighting climate change

Makutu is a Carbon neutral company and is on target to offset all the carbon ever produced by the company since incorporation in 2020 by 2025.

Equal opportunity

Makutu is an equal opportunities organisation, the policies that govern this are covered under HR-007 which is reviewed regularly.

Wellbeing

At Makutu, employee wellbeing is more than just a priority. We believe that having a substantial focus on the satisfaction of our staff builds a stable foundation for a strong workforce, and in turn high level results. Firmly backed by the commitment of our CEO, management team and board of directors, we understand that fostering a culture of employee wellbeing is essential for not only our businesses success, but the happiness of our staff. Our approach to employee wellbeing involves a range of initiatives. Firstly, we offer regular CPD (Continued Professional Development) meetings. This is a dedicated time for each member of the business and their manager to discuss career goals, as well as areas that may require additional guidance, aiding in advancement and career progression. Secondly, by incorporating a remote working system, we believe that our staff benefit from a positive work-life balance due to eliminating commuting time and allowing more personal time. Furthermore, working remotely produces a results-orientated working environment, increased productivity and most importantly greater job satisfaction. Finally, we believe that to produce great results, our staff must have fun along the way. We host regular team building activities and socials, ranging from light exercise to, personal development to team dinners. Our commitment to organising regular team “get togethers” ensures our staff enjoy the social aspect of corporate working, despite our remote structure. In summary, Makutu's approach to employee wellbeing, from tailored CPD meetings to remote work flexibility and stimulating team activities, underlines our commitment to fostering a supportive and fulfilling workplace culture, driving both individual growth and collective success for all team members.

Pricing

Price
£495 to £1,395 a unit a day
Discount for educational organisations
Yes
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at james@makutu.io. Tell them what format you need. It will help if you say what assistive technology you use.