Business Intelligence - BI - OAC, OAS, AWS, Tableau, PowerBI, OBIEE
BI Solutions enable companies to unlock the potential to know about their businesses via intelligently analysing their data. We are here to help you in new development or migration journey
Features
- Oracle Business Intelligence - OBIEE
- BI Publisher
- Tableau
- Oracle OTBI
- Oracle Analytics Cloud
- Microsoft Power BI
- Oracle Visual Analyser
- Oracle Analytics Server
Benefits
- Better Monitoring and Control
- KPI's
- Enterprise Data Platform
- Cutting-edge, custom applications
- Strategic value
- One stop shop solution
Pricing
£500 a licence
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
4 7 1 2 0 1 5 0 2 6 1 1 7 0 5
Contact
XANTRA GROUP LIMITED
Ankit Joshi
Telephone: +447459709685
Email: ankit.joshi@xantragroup.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- N/A
- System requirements
-
- Business Case Driven
- Oracle Licence Model
User support
- Email or online ticketing support
- Yes, at extra cost
- Support response times
- It needs to be part of agreed SLAs
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- We have various support model in place. Standard and featured Supported model.
- Support available to third parties
- No
Onboarding and offboarding
- Getting started
- We provide user documentation coupled with onsite/online training
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Final report will be submitted to the client with our observations and possible enhancements and future supporting model
- End-of-contract process
- Final report will be submitted to the client with our observations and possible enhancements and future supporting model etc...
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Layout difference otherwise data & interpretation is similar
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
- Standard API
- API documentation
- Yes
- API documentation formats
-
- HTML
- API sandbox or test environment
- No
- Customisation available
- No
Scaling
- Independence of resources
- This needs to be dealt on case by case basis. Horizontal scaling is a possible solution with oracle analytical service
Analytics
- Service usage metrics
- Yes
- Metrics types
- OBIEE has usage metric which is configurable on request. Tableau and power BI also has configuration option to monitor service Usage
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra support
- Organisation whose services are being resold
- Oracle
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Encryption of all physical media
- Other
- Other data at rest protection approach
- The visualisation tools read the data and does not store data by itself so this needs to be taken care by underlying data layer
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Data can be exported to oracle native exports, CSV, JSON, and AVRO formats
- Data export formats
-
- CSV
- ODF
- Other
- Other data export formats
- JSON
- Data import formats
-
- CSV
- ODF
- Other
- Other data import formats
- JSON
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- This needs to be discussed as a part of Service level agreement
- Approach to resilience
- Available on request
- Outage reporting
- This would be done via Email Alerts and phone alerts depending on criticality of the system
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
- Other
- Other user authentication
- SAML, Kerberos, AD, OpenID
- Access restrictions in management interfaces and support channels
- Management Interfaces and support channels are secured using roles applied to users to maintain the separation of ability of users. The system is designed to allow only specific and absolutely necessary users the ability to alter authentication and authorisation. Default permission for new users is always set to deny all access until it is specifically granted by and administrative account.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- Data Security is taken very seriously, the critical PCI/PII data would be masked in the data layer and then hashed data would be displayed on visulisation tool
- Information security policies and processes
-
We have a detailed IT Policy (Security and Internet) which we can make available on demand. The key points of which are:
Roles and responsibilities - the policies are established, monitored and breaches investigated by the directors, but at a core level everyone has a responsibility for security.
Monitoring - we reserve the right to monitor employee use of IT resources, tracking and remote wipe software is installed on all devices
Damage and loss - defined actions in the event of damage or loss of equipment
Misuse and vandalism
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
At platform level -- release notes for each major version of OBIEE,Tableau and Power BI will list major fixes and general changes to the system since last release.
At report level - its usage and version control as agreed - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- Host environment - AWS (as well as other cloud providers eg GCP and Azure) have a built in vulnerability testing process which allows the on-demand testing of an VM instance (that we control / have access to).
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Amazon Web Services (as well as other major cloud providers) provide assurance that they take responsibility for identifying potential compromises and alert users on discovery. Response times for such incidents are managed by the underlying cloud provider's team.
- Incident management type
- Supplier-defined controls
- Incident management approach
-
User reported incidents go to our support desk for triage. If the support desk cannot resolve it immediately it is escalated to the correct specialist within the team.
Incidents discovered by our team would be notified directly to the client. Minor issues would usually be resolved then alerted. Major issues would be alerted first and then the focus would move on to resolution.
Incidents are reported via email
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Equal opportunityEqual opportunity
We are committed to equal opportunity and provide equal access to all
Pricing
- Price
- £500 a licence
- Discount for educational organisations
- Yes
- Free trial available
- No