Skip to main content

Help us improve the Digital Marketplace - send your feedback

BCN Group Ltd

Microsoft Fabric - Public Sector services

BCN Group delivers comprehensive Microsoft Fabric services, enhancing operations across the entire public sector beyond just local government.

Features

  • Tailored Microsoft Fabric Solutions for public sector services
  • Unified data platform connecting disparate data sources
  • Data Ingestion: data from almost any data source
  • OneLake: Centralised SaaS Data Lake for robust data processing
  • Data warehouse: Structure & Process Data
  • Data Engineering: Organisation and analysis of large data sets
  • Data science: Using AI tools to improve insights.
  • Business intelligence: Turn Data into Decisions with Power BI
  • BCN Expertise across public sector

Benefits

  • BCN professionals skilled in all Fabric components
  • Data-services expertise across the public sector
  • From data ingestion to insightful analytics
  • Simplified model for Fabric Services
  • Enhanced efficiency across public sector operations
  • Data-driven decision-making capabilities
  • Fostering a data-informed public sector culture
  • Optimising allocation and future planning
  • Operational savings through increased efficiency
  • Continuous improvement with adaptable solutions

Pricing

£1,000 a unit

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at ric.kelly@bcn.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

3 5 9 2 1 2 9 2 0 0 3 7 8 2 5

Contact

BCN Group Ltd Mr Ric Kelly
Telephone: 0345 095 7000
Email: ric.kelly@bcn.co.uk

Service scope

Service constraints
Services are constrained only by the limitations of the Microsoft Fabric Platform & the associated services
System requirements
  • Suitable internet connectivity
  • Relevant Fabric licensing

User support

Email or online ticketing support
Email or online ticketing
Support response times
Depending on Service Purchased Options: Standard Support Hours - Monday - Friday 08:00 - 18:00Hrs Extended Support Hours - Monday - Friday 07:00 - 19:00Hrs Out of Hours Support - P1 ONLY - 24/7 (Excluding Christmas Day) Priority 1: Standard / Extended Hours - Response Within 30 minutes Priority 1: (Out of Hours) Response Within 60 minutes Priority 2: Standard / Extended Hours – Response Within 2 hours Priority 3 or 4: Standard / Extended Hours – Response Within 4 hours Priority 5: Standard / Extended Hours – Response Within 4 hours
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Comprehensive Account Management & Support options
Availability of the Fabric Platform is inherited via Microsoft Support Hours 50+ dedicated support engineers across 3 UK offices provide technical support 24 hours a day, 7 days a week, 365 days a year. * This includes proactive monitoring and alerting of core services. *Waking Hours = 7am to 7pm Monday to Friday (from manned helpdesk) Ticket Severity All tickets logged to the Service Desk will be allocated a severity level based on the following methodology. This will ensure that reporting on service levels may be achieved to the optimum format. 1 - Catastrophic business disruption 2 - Severe business disruption or user critical issue 3 - Business disruption or multiple user issue 4 - Minor business disruption or user issue 5 - Job or Task Service Desk Staff will evaluate the Incident and allocate a priority level after which it will be assigned to the appropriate staff. This will be based on the required skill set to resolve the incident in a timely manner. As a Microsoft Tier-1 CSP BCN will escalate issues to Microsoft as required for additional support.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
For all Fabric Solutions BCN will engage with the customer to identify business requirements & the optimal solution required. Whether that is a migration to Fabric from other data stores or development of an existing solution, BCN will guide from start to finish.
BCN follow the below methodology for delivering projects: Define The first step is always information. We take the time to understand your business. Build We build on our research. Your solution is designed to leverage the insights we learn. Deliver We only ever deliver once we're completely happy and fully tested. Evolve Digital solutions don't stop, they evolve. Metrics & analytics keep pushing you forward.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
Continuity of service is important to us for our customers. All customer data is hosted in the customer's tenant & therefore is fully owned by the customer. At the end of any contracted engagement the customer will control the data within Fabric & BCN access will be removed as necessary. BCN can support extraction from Fabric via multiple methods if required depending on the customer needs.
End-of-contract process
At the end of any contracted engagement BCN will support handover of any solution to the customer. BCN will remove access to all systems as necessary & terminate any support for services.

Using the service

Web browser interface
Yes
Using the web interface
Users can access Fabric Services through the Microsoft Fabric Portal: https://app.fabric.microsoft.com/
Web interface accessibility standard
WCAG 2.1 AA or EN 301 549
Web interface accessibility testing
Microsoft are responsible for Web Interface testing
API
No
Command line interface
No

Scaling

Scaling available
Yes
Scaling type
  • Automatic
  • Manual
Independence of resources
Independence of resources is provided by Microsoft using logical tenant isolation. Multiple forms of protection have been implemented throughout Microsoft Fabric to prevent customers from compromising Microsoft Fabric services or applications or gaining unauthorized access to the information of other tenants or the Microsoft Fabric system itself, including: Logical isolation of customer content within each tenant for Microsoft Fabric services is achieved through Microsoft Entra authorization and role-based access control.
Usage notifications
Yes
Usage reporting
Email

Analytics

Infrastructure or application metrics
Yes
Metrics types
  • CPU
  • HTTP request and response status
  • Memory
  • Number of active instances
Reporting types
Reports on request

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Microsoft

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Backup and recovery

Backup and recovery
Yes
What’s backed up
Data stored in Fabric
Backup controls
Backup is inherited from Microsoft's Fabric services
Datacentre setup
Multiple datacentres with disaster recovery
Scheduling backups
Supplier controls the whole backup schedule
Backup recovery
Users contact the support team

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
Availability of the Fabric Service is leveraged from Microsoft. Service availability <99.9% results in service credits being provided by Microsoft.
Approach to resilience
Microsoft Fabric runs on Microsoft's Azure infrastructure. Microsoft ensures that the baseline infrastructure and platform services are available.

BCN can design for further resiliency as required for the solution, depending on requirements.

Power BI, now a part of the Fabric, has a solid disaster recovery system in place and offers the following features:
BCDR as default.
Cross-region replication: Power BI uses Azure storage geo-redundant replication and Azure SQL geo-redundant replication to guarantee that backup instances exist in other regions and can be used. This means that data is duplicated across different regions, enhancing its availability, and reducing the risks associated with regional outages.

Continued services and access after disaster: Even during disruptive events, Power BI items remain accessible in read-only mode. Items include semantic models, reports, and dashboards, ensuring that businesses can continue their analysis and decision-making processes without significant hindrance.
Outage reporting
Public Dashboard & Email alerts

Identity and authentication

User authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
Access restrictions in management interfaces and support channels
Entra ID provides RBAC controls into customer Fabric environments to restrict access to named resources. Following a least-privilege principle access is controlled via the Entra ID of the customer & other network restrictions based on the solution.
Access restriction testing frequency
At least once a year
Management access authentication
2-factor authentication
Devices users manage the service through
  • Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)
  • Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Between 1 month and 6 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
Between 1 month and 6 months
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
SGS
ISO/IEC 27001 accreditation date
25/06/2020
What the ISO/IEC 27001 doesn’t cover
BCN Group activities related to the provision of this service are covered by ISO 27001
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
BCN Group are certified as compliant with ISO27001 by a UKAS accredited certifying body.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Change requests are raised by the customer or on their behalf by our support team. These are submitted to the change team for review and what-if analysis, the results of which are communicated back to the change owner for review of potential impacts and technical feedback before authorising and scheduling in the work. Upon completion and validation that the change has been successful, relevant documentation and parties are updated accordingly. The Change Advisory Board meet regularly to assess the whole change life-cycle to ensure that safeguards and security remain at the forefront of any changes made.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Production assets are scheduled for daily, automatic scans with the most recent vulnerability signatures. The results of these scans are collected in a secure, central storage service, and automated reporting makes results available to service teams.
Service teams review scan results that report aggregate scan results to provide comprehensive reporting and trend analysis. When vulnerability scans indicate missing patches, security misconfigurations, or other vulnerabilities in the environment, service teams use these reports to target the affected components for remediation. Vulnerabilities discovered through scanning are prioritized for remediation based on their (CVSS) scores and other relevant risk factors - https://learn.microsoft.com/en-us/compliance/assurance/assurance-vulnerability-management
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Protective Monitoring is provided by Microsoft for Fabric Services.
"Microsoft cloud services are continuously monitored for signs of compromise. In addition to automated security monitoring and alerting, all employees receive annual training to recognize and report signs of potential security incidents.
When suspicious activity is detected and escalated, Service-specific Security Response teams initiate a process of analysis, containment, eradication, and recovery"
More information can be found here https://learn.microsoft.com/en-us/compliance/assurance/assurance-incident-management
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
BCN's Incident Management process:
Upon detection of an incident either internally or by report (telephone/email/portal) it is classified due to its impact and the number of users it affects. Where required, an escalation event is then created triggering the assignment of a Major Incident Manager, re-assignment of technical resource and team leader to provide client updates. Updates are provided throughout a major incident (P1) with an incident report provided within 1 week. Root cause analysis undertaken after the incident has been resolved to help mitigate the likelihood of recurrence.

Microsoft's Incident Management processes for infrastructure incidents are found here: https://learn.microsoft.com/en-us/compliance/assurance/assurance-incident-management

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
Yes
Who implements virtualisation
Third-party
Third-party virtualisation provider
Microsoft
How shared infrastructure is kept separate
Microsoft separates client data into organisational structures such as tenants and subscriptions that are only visible to the client in question. Microsoft are responsible for the hyperscale platform that ensures memory and process separation between clients/users.

Energy efficiency

Energy-efficient datacentres
Yes
Description of energy efficient datacentres
Microsoft's Data Centers meet all sustainability requirements: By 2025, Microsoft Data Centres look to shift to 100 percent renewable energy supply. Microsoft Services are up to 98 percent more carbon efficient and up to 93 percent more energy efficient than a traditional enterprise datacenter. Microsoft is investing in a sustainable future through zero environmental impact materials.
More information can be found here - https://datacenters.microsoft.com/globe/powering-sustainable-transformation/

Social Value

Social Value

Social Value

  • Fighting climate change
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

BCN are committed to working with Data Centre partners that share our values on sustainability and environmental impact. With a focus on partners that invest in energy efficient environmentally minded solutions such as battery storage technology, and intelligent cooling, regardless of the upfront costs. We will always look to host with the most energy efficiency conscious providers. End of Life (EOL) equipment is either recycled appropriately, donated to charitable causes or offered to colleagues in return for charitable donations. Eliminated landfill waste and maximising recycling All EOL equipment is disposed of via our WEEE accredited partner

Tackling economic inequality

BCN will create employment and educational opportunities for people from backgrounds that typically find it hard to get employment.

Equal opportunity

Women in the Workforce: We always want the right person to be in the right role for the right reasons. We’re pro-actively making changes and ensuring we are aiming to change the status quo in the tech industry and have a more balanced workforce at BCN and more women in our tech. We do this via: Changing recruitment policies Flexible working Support and development opportunities Our aim is to achieve a 50:50 workforce gender balance.

Wellbeing

BCN is committed to the protection and promotion of the mental health and wellbeing of all staff. We shall continuously strive to improve the mental health environment and culture of the organisation by identifying, eliminating, or minimising all harmful processes, procedures and behaviours that may cause psychological harm or illness to its employees.

Pricing

Price
£1,000 a unit
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at ric.kelly@bcn.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.