Qlik Sense SaaS, Qlik Sense and QlikView
Capventis partners with leading Analytics, Integration and Data Quality provider Qlik, delivering intuitive platform solutions for self-service data visualization, guided analytics applications, embedded analytics and reporting. We specialise in delivering innovative solutions in multiple scenarios using Qlik Sense, QlikView, Qlik NPrinting, Geo-Analytics and Talend for organisations of all sizes.
Features
- Visualisations and Dashboards
- Data Extraction and Transformation
- Automated Insight Generation
- Search and Natural Language Interaction
- Intelligent alerting
- Powerful collaboration
- Automated triggering of immediate actions
- Mobile and embedded analytics
- AutoML and predictive analytics
- Reporting and self service
Benefits
- Get rapid insight to take informed action
- Make your enterprise data more valuable and actionable
- Leverage new technologies like AI/ML
- Build a data-driven culture without the need to code
- Ease of adoption for end user
- Improve governance and user confidence in data
- Enable all skill levels to access insights
- Consolidate data efficiently
- Solve all types of data challenges
- Suitable for big data
Pricing
£390 a licence a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
4 9 5 0 8 9 0 7 8 5 5 8 2 1 2
Contact
Capricorn Ventis Ltd.
Brian O'Flynn
Telephone: +44 845 313 8696
Email: brian.oflynn@capventis.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- The service is standalone service but it can be used to augment any system that holds data, where the data needs to be analysed and visualised
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- Constraints will vary depending on customers individual requirements
- System requirements
-
- For On Premises / Client Managed Cloud:
- Microsoft Windows Server 2016 or above
- Multi-core x64 compatible processors
- RAM: 8 GB minimum.
- Min Disk Space: 5 GB total required to install
- Security: Microsoft Active Directory, SAML & 3rd Party
- Browser Support: Microsoft Edge, Chrome, Firefox, Safari,
- .NET Framework: 4.8
- Postgres 12.1 and above (Part of installation)
- Contact Capventis for further details
User support
- Email or online ticketing support
- Yes, at extra cost
- Support response times
- Typically initial responses are supplied within an hour. Weekend support can be put in place via a special arrangement.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AAA
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Capventis provides an organisation with a standard support level agreements which is delivered on a flat fee structure basis. The support levels escalation procedure process is as follows with the first response is with level one, the Technical Administrator who reports directly to level two support the Technical Account Manager who works together to resolve the technical issue. The next level of support is to the Digital Solutions Manager has solid knowledge of the cloud support solution. At Capventis, the protocol if the issue remains unsolved it is escalated to member of the senior management team (i.e. Operations Director or Managing Director).
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Capventis provides all required services from service strategy, analysis & design, service set up, through to application development, test, training, documentation, coaching, deployment and post go-live support. Service can be delivered both remotely and on-site.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- The data can be extracted to .qvd, csv, JSON, parquet & xml files.
- End-of-contract process
-
In summary the following steps need to take place
Notice needs to be served at least 60 days before the contract period is due to end. Otherwise penalties will apply.
The client needs to take ownership of any data that needs to be retained, otherwise data will be deleted following termination of the contract.
Any professional services required around the End of Contract process are not included in the service cost and will be charged separately
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Linux or Unix
- MacOS
- Windows
- Windows Phone
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- The service has been designed to work on Mobile Devices. As the screens are responsive the layouts will automatically change to fit Mobile and Table devices. There are also dedicated Mobile apps for both android and iOS platforms.
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
-
Qlik provides numerous APIs that support both front (UI) and back-end activities. Qlik provides a full .NET SDK, along with JavaScrtipt libraries and server support via RESTful API end-points.
The APIs provide methods for creating connectors to external systems, extracting and importing, transforming, analysing and visualising data. Users can create additional controls for visualisation and maintain independent libraries if required.
Qlik components communicate via HTTPS and WebSockets, providing an easy method to set up, configure or change services or associated applications. Users can set up applications via both the standard API (via REST calls) or via a web interface (HTTPS).
Service APIs include the ability to configure, monitor or control proxies, repositories, service access and security (including APIs for user-directory maintenance). The JavaScript libraries provide browsers with the ability to handle selections, navigation, data formatting and visualisation and also create custom components to extend both front-end and back-end services.
In addition to .NET, Qlik also supports scripting tools/languages (such as Python) and the user-community provides open-source extensions in other languages including R, C++, C# and Go. - API documentation
- Yes
- API documentation formats
-
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- The technology is a tool that allows users to create and customise applications that analyse and visualise data. Customisation is done through scripting and drag and drop technology. Anybody with the correct user access and training can create their own applications.
Scaling
- Independence of resources
- Qlik operates via the use of load-balanced proxy-servers distributing traffic through to a number of application servers, allowing for virtually infinite scalability, where required. As with any modern load-balanced service, the proxies can forward or restrict traffic based on server load, available capacity, data throughput, time etc. Qlik also works well with external (to Qlik) network management tools (such as NGINX) and can work within QoS management tiers.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Yes – both at a web-server level and at an individual Qlik Sense application level, if required. We can also extend this model to include additional traffic analytics, if necessary.
- Reporting types
-
- API access
- Real-time dashboards
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Capventis is a re-seller providing extra features and support
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- In-house
- Protecting data at rest
- Other
- Other data at rest protection approach
- All encryption is handled by the Qlik Cloud security protocols and the use of industry standard tools to encrypt and to protect data at rest
- Data sanitisation process
- No
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Users can export data via standard application menu/application options. The APIs also provide access to data and users can create data publishers in all common formats.
- Data export formats
-
- CSV
- ODF
- Other
- Other data export formats
-
- JSON,
- XML
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- Mutliple data sources supported
- For futher details contact Capventis
Data-in-transit protection
- Data protection between buyer and supplier networks
- Private network or public sector network
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- These guarantees and service levels are undertaken by Qlik
- Approach to resilience
- Please refer to Capventis for further details. Approach to resilience is based on customer need.
- Outage reporting
- Yes, Capventis are able to provide a service report for the following outages including a public Dashboard, an API and Email Alters
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Other
- Other user authentication
-
All restricted access interfaces pass through ‘in-band’ dedicated routing systems. For some clients, we implement a tiered approach: access restrictions based on specific MAC addresses, defined network routes, VPN-only, and proxy security loops/break-outs.
In addition, software provides hard-coded routing where all restricted interface requests require authentication against an external encrypted and hashed data store. We also employ NIST best practice to design, development, testing and deployment processes to ensure that we employ current best practice in providing management interface protection. - Access restrictions in management interfaces and support channels
-
All restricted access interfaces pass through ‘in-band’ dedicated routing systems. For some clients, we implement a tiered approach: access restrictions based on specific MAC addresses, defined network routes, VPN-only, and proxy security loops/break-outs.
In addition, software provides hard-coded routing where all restricted interface requests require authentication against an external encrypted and hashed data store. We also employ NIST best practice to design, development, testing and deployment processes to ensure that we employ current best practice in providing management interface protection. - Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- Capventis work with clients and adopt their security standards.
- Information security policies and processes
- We follow industry best practice, including ISO 27001/2 and NIST.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Capventis implement a formal blueprint process and pre-agree a statement of work. Development cycles include functional and non-functional testing in a dedicated test environment. Once approved via internal QA processes, we release for user acceptance testing and then schedule risk-managed promotion to the live environment.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
We regularly patch systems and actively maintain/enforce security policies and procedures. Within the procedures, we include client-specific security requirements along with current industry best practice.
Internal assessments involve all relevant parties, including clients. We assess in accordance with both industry standards and relevant project requirements. We employ active monitoring processes to highlight issues as soon as they occur. Additionally, we employ network hardware and software to protect our systems. We gather information about potential threats from our suppliers, antivirus companies, clients, trusted technical media, telecommunications providers, and internal resources. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
We identify potential compromises in several different ways, some dependent on available services within client or supplier environments. Manual checks and software monitors and alerts us to potential network attacks and/or breaches.
We raise issues with senior management and instigate detailed investigations and associated threat assessments immediately. If necessary, we quarantine the machines and network segment(s) affected and/or close down compromised devices. We can then address the issue within a quarantined environment before determining how to restore services and resolve matters arising.
We also employ third parties to test services, and support clients in testing or monitoring for incidents. - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
We use a ticketing service within our CRM system where clients can raise, respond to, and track incidents. We also provide ‘front-desk’ support calls, where clients can call and raise issues via telephone.
For common events, we provide a client Wiki and for more complex client environments, full troubleshooting guides and supporting documentation. We flow-chart common issues to ease resolution, and review processes regularly to resolve/remove regularly occurring or more common issues.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Wellbeing
Fighting climate change
Engaging in Environmental, Social, and Governance (ESG) initiatives in collaboration with local and central governments in Ireland. We facilitate projects aimed at enhancing environmental efficiency and sustainability.Covid-19 recovery
Supported Healthcare organisations identify Covid-19 clusters in the local area. Pinpointing these clusters allowed staff members make informed decisions regarding patient treatments, implement control measures to reduce the spread of the virus, and allocate resources effectively through tracking the flow of patients with and without covid.Wellbeing
Improved local and ventral government performance, as well as public health services by enabling data-driven decision-making in public health departments. Allocation resource optimization to reduce public health costs and improve the outcome.
Pricing
- Price
- £390 a licence a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Qlik allows you to create and share your fully interactive Qlik Sense apps up to 100 people — all for free. 30 day trial period, no catches.
- Link to free trial
- https://www.capventis.com/qlik