Snowflake
Integrated data sharing platform with near infinite scalability. data lakes, enterprise data warehouse, data marts, big data storage and analytics. Secure data sharing. Interfaces with leading ETL, ELT visualisation and machine learning tools. Automatic load based scaling. Upgrades, patches, backups, load-balancing, maintenance and tuning are all handled automatically. NHS expertise,
Features
- Separate Compute/Storage/Services layers allow near infinite scalability
- Pay for just the compute/storage you use
- Automatic scaling up and down with demand
- All data encrypted in transit and at rest
- Column based storage for high performance analytics
- Browser based UI. No software installation required.
- ANSI SQL compliance for wide industry compatibility
- SQL extensions to aid parsing of semi-structured data (JSON/XML/Avro/ORC)
- Automated handling of routine maintenance (backups, tuning, upgrades, patches etc)
- Real time data ingestion from streaming sources (eg Kafka)
Benefits
- Consistent performance regardless of number of users or data size
- Single sign on using latest industry standards (SAML 2.0, Okta)
- Multi-factor authentication configurable for all users.
- Individual departments can be recharged based on usage
- Automated monitoring and alerting can prevent overspending
- Allows simple, secure data sharing with partners or the public
- Compatible with a broad range of ETL/Data ingestion tools
- Compatible with all major data visualisation tools
- Compatible with leading Machine Learning / Data science tools.
- SaaS. Snowflake manages all aspects of software installation and updates
Pricing
£2 to £5 a unit
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
3 9 4 1 0 1 6 3 6 9 4 4 6 5 3
Contact
INTERWORKS EUROPE LTD
Daniel Rostron
Telephone: 07531541276
Email: Daniel.rostron@interworks.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Service constraints
-
Cloud only.
Hosting on Amazon AWS, Microsoft Azure or Google Cloud Platforms only.
Virtual private cloud hosting available on Business Critical Edition only.
https://www.snowflake.com/wp-content/uploads/2017/09/SNO-Solutions_VPS_4.pdf - System requirements
- Standard web browser based user interface
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Within 4 hours Mon - Fri 9am - 5pm
24/7 service is available on request at an additional cost depending on size of environment - User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
We provide office hours support desk service via email, phone and video conference.
Support is provided free of charge for anything to do with ensuring that the software is working as it should. Support is only charged for work which would classify as consulting assistance - this is usually separately agreed with clients in advance.
All accounts have an assigned account manager. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
InterWorks has a team of Snowflake accredited data engineers who can perform initial setup of the Snowflake instance, and then configuration of a warehouse according to a predefined architecture agreed with the client.
Additionally we can provide professional services to set up and configure your data warehouse to specific requirements while following industry best practices.
We can provide solution specific bespoke training once your system is up and running.
Full, current documentation for Snowflake is online and free. - Service documentation
- Yes
- Documentation formats
- HTML
- End-of-contract data extraction
- Data can be unloaded in bulk to flat files cloud data storage (Amazon S3, Azure, or Google Cloud Storage).
- End-of-contract process
- At the end of the contract the licences expire, users are no longer able to log in and access the service. After a short grace period, any data held is deleted.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Mobile apps can connect to Snowflake via standard ODBC/JDBC connectors
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
-
Command line tool "SnowSQL" allows scripting of Snowflake operations outside of the web interface, using powershell, bash or similar.
Python interface also available. - Accessibility standards
- None or don’t know
- Description of accessibility
- Standard ODBC/JDBC connectors mean the data can be accessed from pretty much any application that can connect to a database.
- Accessibility testing
- No specific testing
- API
- Yes
- What users can and can't do using the API
-
All operations that can be performed via the user interface can also be performed via the API.
Snowflake supports developing applications using many popular programming languages and development platforms:-
Go Language: 1.13 (or higher), Java: 1.8 (or higher), Microsoft .NET ( Visual Studio 2017), Node.js: 10.0 (or higher), Python: 3.5 or higher. - API documentation
- Yes
- API documentation formats
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
Role based security with default roles for account administration, user administration and resource administration. Additional custom roles can be created with customised permissions.
A snowflake account can contain any number of databases, schemas, warehouses (compute resources), tables, views, stored procedures, scheduled tasks all of which can be customised. Level of access to each resource is configurable at role level. Users can have multiple roles.
Size of warehouses can be configured individually, as can the extent to which they automatically scale in response to demand from a large number of clients.
Time travel feature can be configured to preserve accidentally changed or deleted data for up to 90 days.
MFA is automatically enabled, and can be enforced for some or all users.
Scaling
- Independence of resources
- The unique architecture of Snowflake, decoupling storage and compute, allows the immediate provisioning of unlimited isolated workloads within seconds. The compute resources required for data ingestion, transformation and data consumption loads, can be completely isolated from each other, as can different groups of users with different compute demands. Compute clusters can be configured to automatically spin up and shut down additional nodes within seconds, depending on load at that time. A sudden unexpected demand from a lot of users won't affect performance for others on the system.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Volume of data stored
User activities and last login
Live monitoring and alerting of warehouse usage consumption
Query history by user including execution plan, and query statistics - Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Snowflake
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
-
Users accessing through a browser can, subject to permissions, download data from a dashboard or from a selection to a csv file.
Users can also, again subject to permissions, download the file to Tableau Desktop or Tableau Reader (free, read only version of Tableau) which allows users to download the data from the workbook or from a selection to csv or a crosstab to Excel. - Data export formats
-
- CSV
- Other
- Other data export formats
- TSV
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- JSON
- Avro
- ORC
- Parquet
- Connection to existing databases via separate ETL or CDC tool
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
Snowflake guarantees 99.9% availability for customers on premier or priority support level agreements, with credits to the customer account in the following month in case of breach.
Full SLA publically viewable at
https://www.snowflake.com/wp-content/uploads/2019/02/Snowflake-Support-Policy-02202019.pdf - Approach to resilience
-
Each layer in the Snowflake architecture is distributed
across availability zones. Because availability zones
are geographically separated data centers with
independent access to power and networking,
operations continue even if one or two availability
zones become unavailable. In addition, the database
storage layer leverages the cloud provider’s resilient
storage service to provide highly durable, costeffective storage. When a transaction is committed
in Snowflake, the data is securely stored in the cloud
provider’s highly durable data storage, which enables
data survival in the event of the loss of one or more
disks, servers, or even data centers. Amazon S3
synchronously and redundantly stores data across
multiple devices in multiple facilities. It is designed
for eleven 9s (99.999999999%) of data durability. - Outage reporting
-
Public dashboard at https://status.snowflake.com/
Anyone can subscribe to e-mail alerts via the above status page
Status updates also available via RSS feed, Atom feed or webhooks
(again can subscribe from above status page)
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
- Other
- Other user authentication
-
Authentication requirements configurable.
Username/password authentication with or without MFA.
OAuth 2.0 either with built in or external OAuth server.
Federated authentication & SSO with configurable identify providers via Okta, AD FA or other SAML2.0 compliant service. - Access restrictions in management interfaces and support channels
- Management Interfaces and support channels are secured using roles applied to users to maintain the separation of ability of users. The system is designed to allow only specific and absolutely necessary users the ability to alter authentication and authorisation. Default permission for new users is always set to deny all access until it is specifically granted by and administrative account.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
- Other
- Description of management access authentication
- Level of access is determined by user role. Process for authentication for management access is exactly the same as all other user authentication.
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- A-LIGN
- ISO/IEC 27001 accreditation date
- 21/5/2019
- What the ISO/IEC 27001 doesn’t cover
-
I don't understand the question.
Certificate available for inspection at
https://www.snowflake.com/wp-content/uploads/2019/12/Snowflake-Computing-Inc.-ISO-27001-Certificate-with-signature-1.pdf - ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- Yes
- Who accredited the PCI DSS certification
- Information available on request
- PCI DSS accreditation date
- Information available on request
- What the PCI DSS doesn’t cover
- Available on Business Critical Edition only
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- Given our role as data analysts we take data security very seriously. We do have an internal security governance policy but this is not currently one that is accredited to an external standard. We have never had a security incident or breach.
- Information security policies and processes
-
We have a detailed IT Policy (Security and Internet) which we can make available on demand. The key points of which are:
Roles and responsibilities - the policies are established, monitored and breaches investigated by the directors, but at a core level everyone has a responsibility for security.
Monitoring - we reserve the right to monitor employee use of IT resources, tracking and remote wipe software is installed on all devices
Damage and loss - defined actions in the event of damage or loss of equipment
Misuse and vandalism
Specific guidelines concerning encryption and security admin policies of portable devices, memory sticks, mobile phones, laptops, AV software, email attachments, commitments in emails, IM systems, licensing of software, and password policies.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
All software updates are handled by Snowflake themselves with no user intervention.
Security announcements, services alerts, pending behaviour changes and release history are available at https://community.snowflake.com/s/announcements
Anyone can subscribe to e-mail notifications of any of these announcements from the same page - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- AWS has a built in vulnerability testing process which allows the on demand testing of an AWS instance (that we control / have access to).
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
Snowflake uses advanced threat detection tools to
monitor all aspects of its infrastructure.
Activities meeting certain criteria generate alerts
that are triaged through Snowflake’s security incident
process. Specific areas of focus include the following:
File integrity monitoring (FIM) tools are used
to ensure that critical system files, have not been
tampered with.
Behavioral monitoring tools monitor network,
user, and binary activity against a known baseline
to identify anomalous behavior.
Snowflake uses threat intelligence feeds to
contextualize and correlate security events and
harden security controls to counteract malicious
tactics, techniques, and procedures (TTPs). - Incident management type
- Supplier-defined controls
- Incident management approach
-
User reported incidents go to our support desk for triage. If the support desk cannot resolve it immediately it is escalated to the correct specialist within the team.
Incidents discovered by our team would be notified directly to the client. Minor issues would usually be resolved then alerted. Major issues would be alerted first and then the focus would move on to resolution.
Incidents are reported via email
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Covid-19 recoveryCovid-19 recovery
Snowflake are dedicated in providing support the NHS to combat COVID 19 recovery
Pricing
- Price
- £2 to £5 a unit
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- A 30 day free trial of any edition with $400 of free credit
- Link to free trial
- http://interworks.com/snowflake-trial