Skip to main content

Help us improve the Digital Marketplace - send your feedback

XANTRA GROUP LIMITED

Business Intelligence - BI - OAC, OAS, AWS, Tableau, PowerBI, OBIEE

BI Solutions enable companies to unlock the potential to know about their businesses via intelligently analysing their data. We are here to help you in new development or migration journey

Features

  • Oracle Business Intelligence - OBIEE
  • BI Publisher
  • Tableau
  • Oracle OTBI
  • Oracle Analytics Cloud
  • Microsoft Power BI
  • Oracle Visual Analyser
  • Oracle Analytics Server

Benefits

  • Better Monitoring and Control
  • KPI's
  • Enterprise Data Platform
  • Cutting-edge, custom applications
  • Strategic value
  • One stop shop solution

Pricing

£500 a licence

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at ankit.joshi@xantragroup.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

4 7 1 2 0 1 5 0 2 6 1 1 7 0 5

Contact

XANTRA GROUP LIMITED Ankit Joshi
Telephone: +447459709685
Email: ankit.joshi@xantragroup.com

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints
N/A
System requirements
  • Business Case Driven
  • Oracle Licence Model

User support

Email or online ticketing support
Yes, at extra cost
Support response times
It needs to be part of agreed SLAs
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
We have various support model in place. Standard and featured Supported model.
Support available to third parties
No

Onboarding and offboarding

Getting started
We provide user documentation coupled with onsite/online training
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Final report will be submitted to the client with our observations and possible enhancements and future supporting model
End-of-contract process
Final report will be submitted to the client with our observations and possible enhancements and future supporting model etc...

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Layout difference otherwise data & interpretation is similar
Service interface
No
User support accessibility
None or don’t know
API
Yes
What users can and can't do using the API
Standard API
API documentation
Yes
API documentation formats
  • HTML
  • PDF
API sandbox or test environment
No
Customisation available
No

Scaling

Independence of resources
This needs to be dealt on case by case basis. Horizontal scaling is a possible solution with oracle analytical service

Analytics

Service usage metrics
Yes
Metrics types
OBIEE has usage metric which is configurable on request. Tableau and power BI also has configuration option to monitor service Usage
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller providing extra support
Organisation whose services are being resold
Oracle

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Yes
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Encryption of all physical media
  • Other
Other data at rest protection approach
The visualisation tools read the data and does not store data by itself so this needs to be taken care by underlying data layer
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Data can be exported to oracle native exports, CSV, JSON, and AVRO formats
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats
JSON
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats
JSON

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
This needs to be discussed as a part of Service level agreement
Approach to resilience
Available on request
Outage reporting
This would be done via Email Alerts and phone alerts depending on criticality of the system

Identity and authentication

User authentication needed
Yes
User authentication
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password
  • Other
Other user authentication
SAML, Kerberos, AD, OpenID
Access restrictions in management interfaces and support channels
Management Interfaces and support channels are secured using roles applied to users to maintain the separation of ability of users. The system is designed to allow only specific and absolutely necessary users the ability to alter authentication and authorisation. Default permission for new users is always set to deny all access until it is specifically granted by and administrative account.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
Data Security is taken very seriously, the critical PCI/PII data would be masked in the data layer and then hashed data would be displayed on visulisation tool
Information security policies and processes
We have a detailed IT Policy (Security and Internet) which we can make available on demand. The key points of which are:
Roles and responsibilities - the policies are established, monitored and breaches investigated by the directors, but at a core level everyone has a responsibility for security.
Monitoring - we reserve the right to monitor employee use of IT resources, tracking and remote wipe software is installed on all devices
Damage and loss - defined actions in the event of damage or loss of equipment
Misuse and vandalism

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
At platform level -- release notes for each major version of OBIEE,Tableau and Power BI will list major fixes and general changes to the system since last release.

At report level - its usage and version control as agreed
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Host environment - AWS (as well as other cloud providers eg GCP and Azure) have a built in vulnerability testing process which allows the on-demand testing of an VM instance (that we control / have access to).
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Amazon Web Services (as well as other major cloud providers) provide assurance that they take responsibility for identifying potential compromises and alert users on discovery. Response times for such incidents are managed by the underlying cloud provider's team.
Incident management type
Supplier-defined controls
Incident management approach
User reported incidents go to our support desk for triage. If the support desk cannot resolve it immediately it is escalated to the correct specialist within the team.
Incidents discovered by our team would be notified directly to the client. Minor issues would usually be resolved then alerted. Major issues would be alerted first and then the focus would move on to resolution.
Incidents are reported via email

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

Equal opportunity

Equal opportunity

We are committed to equal opportunity and provide equal access to all

Pricing

Price
£500 a licence
Discount for educational organisations
Yes
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at ankit.joshi@xantragroup.com. Tell them what format you need. It will help if you say what assistive technology you use.