Qlik Data Integration - Talend & Replicate
Capventis partners with leading Analytics, Integration and Data Quality provider Qlik, delivering intuitive platform solutions for self-service data visualization, guided analytics applications, embedded analytics and reporting. We specialise in delivering innovative solutions in multiple scenarios using Qlik Replicate, Qlik Compose, Qlik Cloud Data Integration, Qlik Gold Client and Talend.
Features
- Data Integration & Migration
- Data Extraction & Streaming
- Change Data Capture (CDC)
- Data Quality & Governance
- Data Replication and Synchronization
- Data Modelling and Schema Mapping
- Data Catalog
- Real-time Data Integration
- Data Warehouse Automation
- Managed Data Lake Creation
Benefits
- Real-time Data Movement
- Advanced Data Transformations
- Actively Monitor Data Lifecycle
- Actionable Data
- Better Visibility of All Activity
- Improved Performonce Monitoring
- Consolidate Data Efficiently
- Data Source Variety
- Data Quality & Governance
- Platform Agnostic
Pricing
£390 a licence a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
3 8 9 7 4 6 4 4 8 7 9 2 9 3 3
Contact
Capricorn Ventis Ltd.
Brian O'Flynn
Telephone: +44 845 313 8696
Email: brian.oflynn@capventis.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- The service is standalone service but it can be used to augment any system that holds data, where the data needs to be processed, moved, and or governed.
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- Constraints will vary depending on customers individual requirements
- System requirements
-
- For Talend Studio 8.0 Client (On Prem)
- Memory : 4GB Minimum
- Required Disk Space 5GB
- Window 2016+, Linux (Ubuntu, SUSE, Red Hat, Amazon)
- Min Disk Space: 5 GB total required to install
- Security: Microsoft Active Directory, SAML & 3rd Party
- Browser Support: Microsoft Edge, Chrome, Firefox, Safari,
- Java 17, 11
- Contact Capventis for further details
User support
- Email or online ticketing support
- Yes, at extra cost
- Support response times
- Typically initial responses are supplied within an hour. Weekend support can be put in place via a special arrangement.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AAA
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Capventis provides an organisation with a standard support level agreements which is delivered on a flat fee structure basis. The support levels escalation procedure process is as follows with the first response is with level one, the Technical Administrator who reports directly to level two support the Technical Account Manager who works together to resolve the technical issue. The next level of support is to the Digital Solutions Manager has solid knowledge of the cloud support solution. At Capventis, the protocol if the issue remains unsolved it is escalated to member of the senior management team (i.e. Operations Director or Managing Director).
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Capventis provides all required services from service strategy, analysis & design, service set up, through to application development, test, training, documentation, coaching, deployment and post go-live support. Service can be delivered both remotely and on-site.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- The data can be extracted to csv, excel, JSON, parquet & xml files.
- End-of-contract process
-
In summary the following steps need to take place
Notice needs to be served at least 60 days before the contract period is due to end. Otherwise penalties will apply.
The client needs to take ownership of any data that needs to be retained, otherwise data will be deleted following termination of the contract.
Any professional services required around the End of Contract process are not included in the service cost and will be charged separately
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- Yes
- Compatible operating systems
-
- Linux or Unix
- MacOS
- Windows
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
-
Users can access a whole library of APIs within Talend, for both ingesting, and making changes.
There is also an built in API creator functionality with Talend to allows limitless interaction. - API documentation
- Yes
- API documentation formats
-
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- The technology is a tool that allows users to create and customise applications that copy, move and transform data. Customisation is done through no code,drag and drop technology and also programming such as Python. Anybody with the correct user access and training can create their own applications.
Scaling
- Independence of resources
- Qlik operates via the use of load-balanced proxy-servers distributing traffic through to a number of application servers, allowing for virtually infinite scalability, where required. As with any modern load-balanced service, the proxies can forward or restrict traffic based on server load, available capacity, data throughput, time etc. Qlik also works well with external (to Qlik) network management tools (such as NGINX) and can work within QoS management tiers.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Yes – both at a web-server level and at an individual Qlik Sense application level, if required. We can also extend this model to include additional traffic analytics, if necessary.
- Reporting types
-
- API access
- Real-time dashboards
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Capventis is a re-seller providing extra features and support
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- In-house
- Protecting data at rest
- Other
- Other data at rest protection approach
- All encryption is handled by the Qlik Cloud security protocols and the use of industry standard tools to encrypt and to protect data at rest
- Data sanitisation process
- No
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Users can export data via standard application menu/application options. The APIs also provide access to data and users can create data publishers in all common formats.
- Data export formats
-
- CSV
- ODF
- Other
- Other data export formats
-
- JSON,
- XML
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- Mutliple data sources supported
- For futher details contact Capventis
Data-in-transit protection
- Data protection between buyer and supplier networks
- Private network or public sector network
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- These guarantees and service levels are undertaken by Qlik
- Approach to resilience
- Please refer to Capventis for further details. Approach to resilience is based on customer need.
- Outage reporting
- Yes, Capventis are able to provide a service report for the following outages including a public Dashboard, an API and Email Alters
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Other
- Other user authentication
-
All restricted access interfaces pass through ‘in-band’ dedicated routing systems. For some clients, we implement a tiered approach: access restrictions based on specific MAC addresses, defined network routes, VPN-only, and proxy security loops/break-outs.
In addition, software provides hard-coded routing where all restricted interface requests require authentication against an external encrypted and hashed data store. We also employ NIST best practice to design, development, testing and deployment processes to ensure that we employ current best practice in providing management interface protection. - Access restrictions in management interfaces and support channels
-
All restricted access interfaces pass through ‘in-band’ dedicated routing systems. For some clients, we implement a tiered approach: access restrictions based on specific MAC addresses, defined network routes, VPN-only, and proxy security loops/break-outs.
In addition, software provides hard-coded routing where all restricted interface requests require authentication against an external encrypted and hashed data store. We also employ NIST best practice to design, development, testing and deployment processes to ensure that we employ current best practice in providing management interface protection. - Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- Capventis work with clients and adopt their security standards.
- Information security policies and processes
- We follow industry best practice, including ISO 27001/2 and NIST.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Capventis implement a formal blueprint process and pre-agree a statement of work. Development cycles include functional and non-functional testing in a dedicated test environment. Once approved via internal QA processes, we release for user acceptance testing and then schedule risk-managed promotion to the live environment.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
We regularly patch systems and actively maintain/enforce security policies and procedures. Within the procedures, we include client-specific security requirements along with current industry best practice.
Internal assessments involve all relevant parties, including clients. We assess in accordance with both industry standards and relevant project requirements. We employ active monitoring processes to highlight issues as soon as they occur. Additionally, we employ network hardware and software to protect our systems. We gather information about potential threats from our suppliers, antivirus companies, clients, trusted technical media, telecommunications providers, and internal resources. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
We identify potential compromises in several different ways, some dependent on available services within client or supplier environments. Manual checks and software monitors and alerts us to potential network attacks and/or breaches.
We raise issues with senior management and instigate detailed investigations and associated threat assessments immediately. If necessary, we quarantine the machines and network segment(s) affected and/or close down compromised devices. We can then address the issue within a quarantined environment before determining how to restore services and resolve matters arising.
We also employ third parties to test services, and support clients in testing or monitoring for incidents. - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
We use a ticketing service within our CRM system where clients can raise, respond to, and track incidents. We also provide ‘front-desk’ support calls, where clients can call and raise issues via telephone.
For common events, we provide a client Wiki and for more complex client environments, full troubleshooting guides and supporting documentation. We flow-chart common issues to ease resolution, and review processes regularly to resolve/remove regularly occurring or more common issues.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Wellbeing
Fighting climate change
Engaging in Environmental, Social, and Governance (ESG) initiatives in collaboration with local and central governments in Ireland. We facilitate projects aimed at enhancing environmental efficiency and sustainability.Covid-19 recovery
Supported Healthcare organisations identify Covid-19 clusters in the local area. Pinpointing these clusters allowed staff members make informed decisions regarding patient treatments, implement control measures to reduce the spread of the virus, and allocate resources effectively through tracking the flow of patients with and without covid.Wellbeing
Improved local and ventral government performance, as well as public health services by enabling data-driven decision-making in public health departments. Allocation resource optimization to reduce public health costs and improve the outcome.
Pricing
- Price
- £390 a licence a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Qlik allows you to create and share your fully interactive Qlik Sense apps up to 100 people — all for free. 30 day trial period, no catches.
- Link to free trial
- https://www.capventis.com/qlik