Skip to main content

Help us improve the Digital Marketplace - send your feedback

Capricorn Ventis Ltd.

Qlik Sense SaaS, Qlik Sense and QlikView

Capventis partners with leading Analytics, Integration and Data Quality provider Qlik, delivering intuitive platform solutions for self-service data visualization, guided analytics applications, embedded analytics and reporting. We specialise in delivering innovative solutions in multiple scenarios using Qlik Sense, QlikView, Qlik NPrinting, Geo-Analytics and Talend for organisations of all sizes.

Features

  • Visualisations and Dashboards
  • Data Extraction and Transformation
  • Automated Insight Generation
  • Search and Natural Language Interaction
  • Intelligent alerting
  • Powerful collaboration
  • Automated triggering of immediate actions
  • Mobile and embedded analytics
  • AutoML and predictive analytics
  • Reporting and self service

Benefits

  • Get rapid insight to take informed action
  • Make your enterprise data more valuable and actionable
  • Leverage new technologies like AI/ML
  • Build a data-driven culture without the need to code
  • Ease of adoption for end user
  • Improve governance and user confidence in data
  • Enable all skill levels to access insights
  • Consolidate data efficiently
  • Solve all types of data challenges
  • Suitable for big data

Pricing

£390 a licence a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at brian.oflynn@capventis.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

4 9 5 0 8 9 0 7 8 5 5 8 2 1 2

Contact

Capricorn Ventis Ltd. Brian O'Flynn
Telephone: +44 845 313 8696
Email: brian.oflynn@capventis.com

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
The service is standalone service but it can be used to augment any system that holds data, where the data needs to be analysed and visualised
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints
Constraints will vary depending on customers individual requirements
System requirements
  • For On Premises / Client Managed Cloud:
  • Microsoft Windows Server 2016 or above
  • Multi-core x64 compatible processors
  • RAM: 8 GB minimum.
  • Min Disk Space: 5 GB total required to install
  • Security: Microsoft Active Directory, SAML & 3rd Party
  • Browser Support: Microsoft Edge, Chrome, Firefox, Safari,
  • .NET Framework: 4.8
  • Postgres 12.1 and above (Part of installation)
  • Contact Capventis for further details

User support

Email or online ticketing support
Yes, at extra cost
Support response times
Typically initial responses are supplied within an hour. Weekend support can be put in place via a special arrangement.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AAA
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Capventis provides an organisation with a standard support level agreements which is delivered on a flat fee structure basis. The support levels escalation procedure process is as follows with the first response is with level one, the Technical Administrator who reports directly to level two support the Technical Account Manager who works together to resolve the technical issue. The next level of support is to the Digital Solutions Manager has solid knowledge of the cloud support solution. At Capventis, the protocol if the issue remains unsolved it is escalated to member of the senior management team (i.e. Operations Director or Managing Director).
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Capventis provides all required services from service strategy, analysis & design, service set up, through to application development, test, training, documentation, coaching, deployment and post go-live support. Service can be delivered both remotely and on-site.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
The data can be extracted to .qvd, csv, JSON, parquet & xml files.
End-of-contract process
In summary the following steps need to take place
Notice needs to be served at least 60 days before the contract period is due to end. Otherwise penalties will apply.
The client needs to take ownership of any data that needs to be retained, otherwise data will be deleted following termination of the contract.
Any professional services required around the End of Contract process are not included in the service cost and will be charged separately

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
  • Linux or Unix
  • MacOS
  • Windows
  • Windows Phone
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
The service has been designed to work on Mobile Devices. As the screens are responsive the layouts will automatically change to fit Mobile and Table devices. There are also dedicated Mobile apps for both android and iOS platforms.
Service interface
No
User support accessibility
None or don’t know
API
Yes
What users can and can't do using the API
Qlik provides numerous APIs that support both front (UI) and back-end activities. Qlik provides a full .NET SDK, along with JavaScrtipt libraries and server support via RESTful API end-points.
The APIs provide methods for creating connectors to external systems, extracting and importing, transforming, analysing and visualising data. Users can create additional controls for visualisation and maintain independent libraries if required.
Qlik components communicate via HTTPS and WebSockets, providing an easy method to set up, configure or change services or associated applications. Users can set up applications via both the standard API (via REST calls) or via a web interface (HTTPS).
Service APIs include the ability to configure, monitor or control proxies, repositories, service access and security (including APIs for user-directory maintenance). The JavaScript libraries provide browsers with the ability to handle selections, navigation, data formatting and visualisation and also create custom components to extend both front-end and back-end services.
In addition to .NET, Qlik also supports scripting tools/languages (such as Python) and the user-community provides open-source extensions in other languages including R, C++, C# and Go.
API documentation
Yes
API documentation formats
  • HTML
  • PDF
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
The technology is a tool that allows users to create and customise applications that analyse and visualise data. Customisation is done through scripting and drag and drop technology. Anybody with the correct user access and training can create their own applications.

Scaling

Independence of resources
Qlik operates via the use of load-balanced proxy-servers distributing traffic through to a number of application servers, allowing for virtually infinite scalability, where required. As with any modern load-balanced service, the proxies can forward or restrict traffic based on server load, available capacity, data throughput, time etc. Qlik also works well with external (to Qlik) network management tools (such as NGINX) and can work within QoS management tiers.

Analytics

Service usage metrics
Yes
Metrics types
Yes – both at a web-server level and at an individual Qlik Sense application level, if required. We can also extend this model to include additional traffic analytics, if necessary.
Reporting types
  • API access
  • Real-time dashboards
  • Reports on request

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Capventis is a re-seller providing extra features and support

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least every 6 months
Penetration testing approach
In-house
Protecting data at rest
Other
Other data at rest protection approach
All encryption is handled by the Qlik Cloud security protocols and the use of industry standard tools to encrypt and to protect data at rest
Data sanitisation process
No
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Users can export data via standard application menu/application options. The APIs also provide access to data and users can create data publishers in all common formats.
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats
  • JSON,
  • XML
Data import formats
  • CSV
  • Other
Other data import formats
  • Mutliple data sources supported
  • For futher details contact Capventis

Data-in-transit protection

Data protection between buyer and supplier networks
Private network or public sector network
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
These guarantees and service levels are undertaken by Qlik
Approach to resilience
Please refer to Capventis for further details. Approach to resilience is based on customer need.
Outage reporting
Yes, Capventis are able to provide a service report for the following outages including a public Dashboard, an API and Email Alters

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
  • Other
Other user authentication
All restricted access interfaces pass through ‘in-band’ dedicated routing systems. For some clients, we implement a tiered approach: access restrictions based on specific MAC addresses, defined network routes, VPN-only, and proxy security loops/break-outs.
In addition, software provides hard-coded routing where all restricted interface requests require authentication against an external encrypted and hashed data store. We also employ NIST best practice to design, development, testing and deployment processes to ensure that we employ current best practice in providing management interface protection.
Access restrictions in management interfaces and support channels
All restricted access interfaces pass through ‘in-band’ dedicated routing systems. For some clients, we implement a tiered approach: access restrictions based on specific MAC addresses, defined network routes, VPN-only, and proxy security loops/break-outs.
In addition, software provides hard-coded routing where all restricted interface requests require authentication against an external encrypted and hashed data store. We also employ NIST best practice to design, development, testing and deployment processes to ensure that we employ current best practice in providing management interface protection.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
Capventis work with clients and adopt their security standards.
Information security policies and processes
We follow industry best practice, including ISO 27001/2 and NIST.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Capventis implement a formal blueprint process and pre-agree a statement of work. Development cycles include functional and non-functional testing in a dedicated test environment. Once approved via internal QA processes, we release for user acceptance testing and then schedule risk-managed promotion to the live environment.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
We regularly patch systems and actively maintain/enforce security policies and procedures. Within the procedures, we include client-specific security requirements along with current industry best practice.
Internal assessments involve all relevant parties, including clients. We assess in accordance with both industry standards and relevant project requirements. We employ active monitoring processes to highlight issues as soon as they occur. Additionally, we employ network hardware and software to protect our systems. We gather information about potential threats from our suppliers, antivirus companies, clients, trusted technical media, telecommunications providers, and internal resources.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
We identify potential compromises in several different ways, some dependent on available services within client or supplier environments. Manual checks and software monitors and alerts us to potential network attacks and/or breaches.
We raise issues with senior management and instigate detailed investigations and associated threat assessments immediately. If necessary, we quarantine the machines and network segment(s) affected and/or close down compromised devices. We can then address the issue within a quarantined environment before determining how to restore services and resolve matters arising.
We also employ third parties to test services, and support clients in testing or monitoring for incidents.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
We use a ticketing service within our CRM system where clients can raise, respond to, and track incidents. We also provide ‘front-desk’ support calls, where clients can call and raise issues via telephone.
For common events, we provide a client Wiki and for more complex client environments, full troubleshooting guides and supporting documentation. We flow-chart common issues to ease resolution, and review processes regularly to resolve/remove regularly occurring or more common issues.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Wellbeing

Fighting climate change

Engaging in Environmental, Social, and Governance (ESG) initiatives in collaboration with local and central governments in Ireland. We facilitate projects aimed at enhancing environmental efficiency and sustainability.

Covid-19 recovery

Supported Healthcare organisations identify Covid-19 clusters in the local area. Pinpointing these clusters allowed staff members make informed decisions regarding patient treatments, implement control measures to reduce the spread of the virus, and allocate resources effectively through tracking the flow of patients with and without covid.

Wellbeing

Improved local and ventral government performance, as well as public health services by enabling data-driven decision-making in public health departments. Allocation resource optimization to reduce public health costs and improve the outcome.

Pricing

Price
£390 a licence a year
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Qlik allows you to create and share your fully interactive Qlik Sense apps up to 100 people — all for free. 30 day trial period, no catches.
Link to free trial
https://www.capventis.com/qlik

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at brian.oflynn@capventis.com. Tell them what format you need. It will help if you say what assistive technology you use.