Secure Data Environment - SDE
Fully integrated, cloud-native solution enabling healthcare research and analytics teams to securely access and collaborate on diverse data sets through tailored, self-service analytics workspaces used for collaborative clinical research and analysis.
Features
- Intelligent search to quickly identify cohort specific data sets
- Automated data access controls
- Data Science Toolkit
- Ability to create and manage workspaces
- AI-based data cataloguing
- On-demand Elastic Compute Environment
- Analytical tools and processing pipelines
- Automated provisioning of cloud-based workspaces
Benefits
- Accelerates time to productive use for researchers
- Enable rapid collaboration for researchers
- Enhanced data knowledge
- Support diverse workloads
- Centralised management
- Democratisation of data
- Research specific processing piplines
- Budgetary control at workspace level
Pricing
£494,000.00 a unit
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
4 3 7 1 6 5 8 1 3 4 9 3 9 5 5
Contact
HITACHI DIGITAL SERVICES UK LIMITED
Public Sector Team
Telephone: 07707585971
Email: HCUK.BidTeam@hitachivantara.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- No
- System requirements
- Designed to work with a public cloud (e.g. AWS).
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- As per agreed SLAs.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Yes, at an extra cost
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- We will provide a dedicated we portal clearly signposting web chat feature. Users are able to ask questions and request chat with support personnel.
- Web chat accessibility testing
- None
- Onsite support
- Yes, at extra cost
- Support levels
- As per agreed SLA's
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We provide a range of onboarding content including videos and user documentation embedded within platform
- Service documentation
- Yes
- Documentation formats
-
- HTML
- Other
- Other documentation formats
-
- Videos templates
- Tutorials
- End-of-contract data extraction
- Data will be exported and placed in a cloud storage repository e.g. S3
- End-of-contract process
-
Subsequent to the end of contract the buyer will be able to continue:
1. Long term support contract
2. Move to new infrastructure deployment
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Difference in form factor with reduced data load to accommodate mobile screen.
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- Users are able to use the standard APIs provided with the product.
- Accessibility standards
- None or don’t know
- Description of accessibility
- Users are able to use the standard APIs provided with the product.
- Accessibility testing
- NA
- API
- Yes
- What users can and can't do using the API
-
Users are able to use the standard APIs provided with the product.
API automation tools:
Chef
Terraform - API documentation
- Yes
- API documentation formats
- Other
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Ask Paul Watson on this question
Scaling
- Independence of resources
-
(1) Scaling available: Yes
(2) Scaling types:
Scales automatically
Scales with user intervention
(3) Workspaces are independent through network, service configuration and security policy.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
1. Infrastructure or application metrics:
Yes
2. Metrics types:
CPU
Disk
HTTP request and response status
Memory
Network
Number of active instances
Other
3. Other metrics:
Security
Compliance
User account metrics
Cloud consumption
4. Reporting types:
Real-time dashboards
Regular reports
Reports on request - Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Users can export data through defined and established processes and procedures. Existing documentation available upon request.
- Data export formats
-
- CSV
- Other
- Other data export formats
- Yes - Descriptions available upon request
- Data import formats
-
- CSV
- Other
- Other data import formats
- Variety of formats-established process - available upon request
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- As per agreed SLA. Option - leverage the AWS Cloud infrastructure to ensure acceptable access availability. The SDE Workspaces are a cloud-based compute cluster built on Hadoop/AWS EMR and EC2 that researchers can interact with directly in their browser. Disaster recovery and incident response plans are in place to ensure that appropriate recovery steps are followed, including stakeholder notification, which meets both industry best practices
- Approach to resilience
- The service is deployed across highly available, fault tolerant, physically separate locations. Each physical location is equipped with independent power, cooling, and networking infrastructure. Further information is available on request.
- Outage reporting
- Outages reported through AWS Health Dashboard as well as Email alerts.
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Username and Password (Active Directory), AWS SCM, OAUTH2, SSO
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- Between 6 months and 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- Between 6 months and 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- BSI
- ISO/IEC 27001 accreditation date
- 14/04/2021
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
- FedRamp - level 2
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- ISO/IEC 27001
- Other
- Other security governance standards
- NIST 800-53
- Information security policies and processes
- We are compliant to ISO27001, Data Security Protection Toolkit (DSPT) and GDPR. We have a defined reporting structure which we will share on request.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Change Management is co-ordinated through a structured process with the support team and product development.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Vulnerability management is provided by our public cloud platform. We also perform software composition analysis and dynamic app security testing as part of the standard DevOps processes. More detailed information is available on request.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Application logs, operating system logs, AWS Service logs and other environment specific logs, along with performance data, are stored within the SDE environment. All of the logs are organised and retained as necessary for operational, auditing, and compliance requirements. The Log Aggregator ingests logs from different sources, configures meaningful dashboards and evaluates that information in the context of well-respected security and compliance frameworks. Our SDE has comprehensive features that provide audit trails necessary to document compliance. Centralised logging allows our SDE to verify integrity of data and audit logs to maintain alignment with industry standards and retention policies.
- Incident management type
- Supplier-defined controls
- Incident management approach
-
Hitachi has a pre-defined process. Incidents can be raised through alert monitoring or the customer/end users can raise tickets either themselves through a portal or via our Service Desk, depending on the agreed model. The initiator of the ticket/incident is kept informed of progress via email and/or via the Assure Application which can be installed on their mobile, tablet as may be permitted. Reporting monthly via the monthly service reports and review meetings. Critical Incidents subject to our Major
Incident Management process which is agreed with the customer. Major Incident Report is a specific follow up for a Major Incident.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
-
- NHS Network (N3)
- Health and Social Care Network (HSCN)
- Other
- Other public sector networks
- NHS Network and HSCN - SDE can subject to requirements
Social Value
- Social Value
-
Social Value
Tackling economic inequalityTackling economic inequality
Hitachi has actively addressed workforce inequality, appointing Lorena Dellagiovanna as our first Chief Diversity Officer and board member in April 2021, alongside Claire Thomas as CDIO. Resulting Success: 1. Inclusive Recruitment and further Development Practices: We prioritise fair treatment and equal opportunities for contract workers, incorporating CV blind interviewing. Our self-directed DEI training platform including subjects of inclusive leadership, creating an inclusive culture, how to overcome bias and many other topics has boosted female and non-Japanese executives at Hitachi by 10%. Now Focusing on emerging talent, we sponsor the 'Festival of the Girl' in London. 2. Investment in Physical and Mental Health: We offer Financial Advice, Career Advice, and anonymous mental health support both internally, through our Mental Health First Aiders, and externally via Optum/MyHeathWebb. We have an Employee Assistance program that ensures employees, and their dependents have access to professional counselling should they require it. More widely, we implemented the Mental Health at Work commitment standards, tailored to the Hitachi workforce. We also have 4 dedicated sessions led by the Equality Institute on how to talk about gender identity, being an ally, using LGBTQ+ identity as a superpower and transgender 101. 3. Environmental Innovator: Hitachi aims to be an innovator, reducing carbon for governments, cities, and customers. The Environmental Vision emphasizes solving environmental issues for a higher quality of life and a sustainable society. Partnering with Rainforest Connection, Hitachi develops data-driven solutions to protect rainforests, combat illegal logging, and preserve biodiversity. As a Principal Partner of COP26, Hitachi contributed to decarbonization and climate action. Committed to a Net Zero society, Hitachi strengthens climate targets across the entire value chain by 2050. We were also key contributors at COP28. In conclusion, By implementing improvements and actively addressing inequality, Hitachi aims to create an inclusive and supportive work environment.
Pricing
- Price
- £494,000.00 a unit
- Discount for educational organisations
- No
- Free trial available
- No