Skip to main content

Help us improve the Digital Marketplace - send your feedback

Datopian (Viderum Ltd trading as)

CKAN Open Data Portal

Datopian delivers outstanding solutions that enable your organization to realise your data’s potential. From hosted CKAN to customised data catalogs, from specialised data engineering to data strategy consultation, Datopian empowers your move from data to insight. Datopian CKAN provides seamless experience for the preparation, publication, and analysis of open data.

Features

  • Data storage and APIs. Open API.
  • Engaging data visualization and exploration. Data validation and schemas.
  • Orchestration and integration of data. Data Lake coordination and organization.
  • Data licensing. Data standards. Data search. Customized theming.
  • Publication workflow and metadata management. Rich set of metadata.
  • Showcasing and presentation of datasets extending to interactive exploration.
  • Advanced geospatial features, covering data preview, search, and discovery.
  • An intuitive web interface. Extend. Develop more features.
  • Data Catalog.
  • Open Data & CKAN Training.

Benefits

  • Publish data properly. Empower your citizens.
  • Enable innovation by making data accessible by UI and API.
  • Compliance. Transparency. Innovation.
  • Central point of discovery. All your data in one place.
  • Easy publishing for non-technical staff.
  • Foundation for your transparency initiatives.
  • Making data discoverable and accessible.
  • Building rich applications and analytics workflows.
  • Providing a foundation for data integration.
  • Secure access control. Collaborate with confidence.

Pricing

£499.99 an instance a month

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at contact@datopian.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

5 1 0 3 0 7 0 0 6 7 9 1 2 2 3

Contact

Datopian (Viderum Ltd trading as) Yoana Popova
Telephone: +1 (341) 222-3743
Email: contact@datopian.com

Service scope

Service constraints
None. CKAN is the world’s leading open-source data management software and builds everything from open data portals to enterprise data catalogs. Whether you are looking to publish data openly or manage internal data, CKAN builds systems that scale. Combined with our agile, iterative and consultative approach to understanding customer and stakeholders needs and our ability to rapidly create innovative solutions, there are basically no constraints.
System requirements
  • Operating System
  • Modern Web Browser

User support

Email or online ticketing support
Email or online ticketing
Support response times
Our support response times are tailored to the chosen support plan, ranging from 4 to 48 hours, depending on the package (Bronze, Silver, Gold, Platinum). Users can access support through various channels, including email, phone, online chat, and screen-share sessions. For round-the-clock assistance, our 24/7 support ensures consistent response times, addressing queries promptly on weekdays and weekends alike. This ensures users receive timely assistance regardless of the time or day of the week.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
Web chat
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
WCAG 2.1 AA or EN 301 549
Web chat accessibility testing
We have conducted targeted testing of our web chat services with assistive technology users to ensure accessibility:

- Screen reader compatibility - we tested with visually impaired users employing screen readers like JAWS, NVDA, and VoiceOver;
- Keyboard-only navigation - sessions with users reliant on keyboard navigation helped refine access to all chat features using keyboard shortcuts alone;
- High contrast and readability: we adjusted our chat interface for users needing high contrast or larger text, testing these settings to improve visibility and readability under various conditions.
Onsite support
Yes, at extra cost
Support levels
1. Basic Support Plan
Cost: $0 per month, available only with a hosting plan.
Features: Includes email support with a 48-hour response time. This plan operates 24x7 online.

2. Silver Support Plan
Cost: $500 per month.
Features: Offers comprehensive online support with a 24-hour response time, available 24x7 online.

3. Gold Support Plan
Cost: $1,210 per month.
Features: Provides phone, online, and screen-share support with an 8-hour response time. This support is available 24x7 online and 12x5 via phone.

4. Platinum Support Plan
Cost: $2,330 per month.
Features: Includes full dedicated phone, online, and screen-share support with a 4-hour response time. This level is available 24x7 online and 12x5 via phone.

Specialized Support Roles
- Technical Account Manager: Provided in the Enterprise hosting and support plan, which includes the Gold/Platinum support levels.
- Cloud Support Engineer: Typically involved in the higher tiers of support (Gold and Platinum plans), where more technical and immediate support is required, including real-time problem-solving and optimization guidance.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
At Datopian we have a well-established knowledge transfer strategy that provides the different user groups - both technical and non-technical - with the information, skills and knowledge they will need. Our knowledge transfer strategy combines technology, culture, measurement, and infrastructure. Main objectives of every project are not only to build sustainable platforms but also to ensure that the Buyers have sufficient training and support to begin and also to continue running the services efficiently once our engagement has concluded.

The delivery method for transferring knowledge is a combination of video-based live workshops with Q&A sessions, hand-over documents, pre-recorded videos, online course materials, tutorials, and regular technical support. Knowledge transfer is linked with relational knowledge-based assets (tutorials, online chat rooms, FAQs, and so forth).

Our training consists of a series of flexible, customisable modules suitable for a wide range of participants. Planning of sessions is done in close collaboration with the Buyer team to produce a bespoke programme of courses that will meet the needs of the Buyer.

We collect all materials we create (or have created) in a content repository to ensure this knowledge is accessible to all, preserved, searchable and available to Buyer employees once our engagement has concluded.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
All terms are determined at the beginning of a contract on an individual basis, and will be agreed at the time of service commencement. Data extraction is done according to the customer's needs and depends on how the data will be used in the future. A DB dump can be provided, database tables can be retrieved as CSV / JSON files etc. It is important to note that after the expiration of the contract, there is a storage and archive periods in which users can retrieve / request their data.
End-of-contract process
At contract termination, a structured protocol ensures clarity and continuity. The conclusion of contract costs and terms hinges on the nature of the service provided, with agreements typically solidified at service commencement. A handover meeting is standard practice to ensure a smooth transition of responsibilities. Given the open-sourced nature of CKAN, documentation is requisite.

The contract price encompasses core services and essential support for operational continuity. However, specialized assistance or supplementary services beyond the standard agreement may incur additional charges.

Using the service

Web browser interface
Yes
Using the web interface
Through our web interface, users can efficiently set up the service by configuring parameters such as data sources, permissions, and standards for standardizing, validating, and interacting with data. Data curators can easily integrate data from a range of sources, and model data into a standard format. However, advanced configurations and complex requirements may require administrative access or backend adjustments.
Web interface accessibility standard
WCAG 2.1 AA or EN 301 549
Web interface accessibility testing
We conduct comprehensive web interface testing with assistive technology users to ensure accessibility and usability for individuals with diverse needs. Our testing protocols encompass screen readers, keyboard navigation, voice recognition software, and other assistive technologies commonly used by individuals with disabilities.
API
Yes
What users can and can't do using the API
Users have extensive capabilities when utilizing the API. While initial service setup is facilitated via request rather than directly through the API, once a dedicated environment is established, users gain full access to perform various operations. This includes tasks such as user management, dataset metadata and data management, organizational management, and more, all through the API. As our service is designed with an API-first approach, there are no limitations on API usage.

The API offers users a seamless way to access machine-readable data without relying on the GUI. It enables users to execute OLAP-style data queries, conduct searches across data fields, and apply powerful metadata-based filtering and sorting functionalities.
API automation tools
  • Terraform
  • Other
Other API automation tools
  • Kubernetes
  • Docker
  • CI/CD via GitOps
API documentation
Yes
API documentation formats
  • HTML
  • PDF
Command line interface
Yes
Command line interface compatibility
  • Linux or Unix
  • Windows
  • MacOS
  • Other
Using the command line interface
Users can perform various tasks using the command line interface to interact with CKAN. Initially, users can set up the service by deploying a CKAN instance through CLI commands. This includes configuring parameters such as data sources, permissions, and system preferences. Additionally, users can make changes to existing configurations, datasets, and permissions through CLI commands, allowing for efficient management of the CKAN instance. However, certain advanced configurations or specialized tasks may require additional manual intervention or backend adjustments beyond the capabilities of the CLI.

Scaling

Scaling available
Yes
Scaling type
  • Automatic
  • Manual
Independence of resources
To ensure independence of resources, we employ resource isolation, dynamic scaling, and load balancing testing. As CKAN hosting experts, we continuously monitor services and infrastructures, implementing automatic scaling to alleviate performance issues. Fair usage policies further prevent individual users from impacting others.
Usage notifications
Yes
Usage reporting
  • API
  • Email
  • Other
Other usage reporting
Users are notified when nearing service limits through proactive alerts via email, dashboard notifications, or in-app messages. These notifications are triggered when usage approaches predefined thresholds, allowing users to take action to avoid service disruptions or additional charges. Additionally, users can access real-time usage metrics and track their consumption through the user dashboard for greater transparency and control.

Analytics

Infrastructure or application metrics
Yes
Metrics types
  • HTTP request and response status
  • Number of active instances
  • Other
Other metrics
  • Visits
  • Usage statistics
  • Downloads
  • Frequency of dataset access by dataset
  • Combinations of datasets accessed together
  • Datasets without updates over a given time period
  • Number of resources downloaded by dataset
  • New datasets published since the last report
  • Datasets without a listed licence
  • Visitors by country, browser and device
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
In-house
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Backup and recovery

Backup and recovery
Yes
What’s backed up
  • Metadata: Information about datasets, resources, organizations, and users
  • Datasets: Actual data files uploaded to the portal
  • Configuration settings: Custom configurations and settings
  • Extensions: Additional functionality and features added to the CKAN instance
  • User accounts and permissions: User profiles, roles, and access permissions
Backup controls
Users can control backup procedures through our Support team, specifying distinct schedules for various components. By default, automated backups occur regularly (every 24 hours), with a retention period of 30 days. Backup schedules can be tailored for individual projects upon request. Additionally, we provide comprehensive data restoration and disaster recovery protocols, available upon request.
Datacentre setup
Multiple datacentres with disaster recovery
Scheduling backups
Users schedule backups through a web interface
Backup recovery
  • Users can recover backups themselves, for example through a web interface
  • Users contact the support team

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
We guarantee a high level of availability for our solution, hosted, maintained and supported within our Cloud infrastructure, featuring a robust high-availability setup adhering to best practices. Our default uptime SLA stands at an industry-leading 99.9%. Leveraging Google's infrastructure in the EU, renowned for its reliability, enhances our service's resilience. Having successfully hosted and maintained numerous Government Data Portals (both open and internal) from around the world including US, UK, Denmark, Germany, Switzerland, Canada and many more underscores our expertise and track record in this domain. Specific terms and conditions are tailored to each client and established at the contract's onset, ensuring transparency and alignment with individual needs and expectations.

In the rare event of not meeting these levels, users receive refunds or service credits as outlined in our SLAs, ensuring accountability and customer satisfaction. Continuous monitoring and proactive maintenance are integral to minimizing downtime and upholding our reliability standards.
Approach to resilience
Available on request.
Outage reporting
Datopian maintains close relationships with customers. In the event of an outage, we prioritize direct communication channels, contacting our clients promptly via phone and email. This ensures that our clients are informed promptly and accurately about any service disruptions. Users always receive email alerts regarding any service interruptions. We provide details about the issue, the expected times of the rectification, and any additional assistance they may need. This approach underscores our commitment to transparency and proactive communication with our valued clients.

Identity and authentication

User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google apps)
  • Username or password
Access restrictions in management interfaces and support channels
Our services uphold robust access restrictions through role-based access control (RBAC) and fine-grained access management. RBAC is configured based on role-permissions, user-role, and role-role relationships, offering flexibility to customize roles and permissions to align with the client's organizational structure. Our solution includes out-of-the-box roles that can be tailored to meet specific requirements, with the ability to modify and extend permission levels as necessary. Additionally, we offer pre-defined roles with access to support services, monitoring utilities, source code management, and environment configuration modifications, enabling precise assignment of permissions as needed.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password
Devices users manage the service through
  • Dedicated device on a segregated network (providers own provision)
  • Dedicated device over multiple services or networks
  • Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)
  • Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
Our security governance strategy is agile and responsive to emerging threats. Led by our dedicated team, we continuously enhance defenses against evolving risks. The foundation of our security posture is reinforced by the collective knowledge of our open-source community, including prominent governments and enterprises worldwide. Regular code audits are conducted by various stakeholders, with findings promptly addressed by our tech core team, releasing security patches as needed. These patches are swiftly applied to all customer environments to ensure ongoing protection. We also conduct frequent penetration testing and comprehensive security audits to validate the effectiveness of our security measures.
Information security policies and processes
We have baseline security requirements established for developed or acquired, organizationally-owned or managed, physical or virtual, applications and infrastructure system, and network components that comply with applicable legal, statutory, and regulatory compliance obligations. Deviations from standard baseline configurations must be authorized following change management policies and procedures prior to deployment, provisioning, or use. Compliance with security baseline requirements is reassessed annually unless an alternate frequency has been established and authorized based on business needs. We specifically train our employees regarding their specific roles and the information security controls they must fulfil. Employment agreements incorporate provisions and/or terms for adherence to established information governance and security policies and are signed by newly hired or on-boarded workforce personnel prior to granting workforce personnel user access to corporate facilities, resources, and assets. Access to, and use of, audit tools that interact with the organization's information systems are appropriately segmented and restricted to prevent compromise and misuse of log data. We restrict, log, and monitor access to our information security management systems (e.g., hypervisors, firewalls, vulnerability scanners, network sniffers, APIs, etc.) and we monitor and log privileged access (e.g., administrator level). More information, available on request.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Our approach exceeds government compliance standards, ensuring robust security for government services and citizens. Our agile security team anticipates and adapts to emerging threats, continuously enhancing safeguards. Development updates undergo thorough change request and review processes. We have documented configuration and change management policies, which have been implemented, maintained and assessed in accordance with the guidance from ISO27001. This ensures components are tracked throughout their lifecycle and changes are assessed for potential security impacts, providing peace of mind with our technology solutions.
Vulnerability management type
Undisclosed
Vulnerability management approach
Our vulnerability management process is robust, supported by established policies, procedures, and technical measures. With our solution backed by a large open-source community, including major governments and enterprises, we benefit from continuous code audits and prompt reporting of findings. The core tech team releases security patches on a regular basis and we make sure it is applied to all our customers in a timely manner. This proactive approach, combined with our commitment to transparency and collaboration, enables us to effectively assess potential threats and safeguard our services. More information, available on request.
Protective monitoring type
Undisclosed
Protective monitoring approach
We employ cloud-specific monitoring tools to ensure continuous system oversight. Our engineering and system administration staff keep up to date on vendor announcements concerning compromises. We utilize SIEM best practices such as requirement, compliance, access control with alerts and reports on policy infringements and suspicious behaviour, perimeter defences, resource integrity, intrusion detection, malware defence, application defences, acceptable use etc. Weekly vulnerability scans help identify and address any flaws promptly. Any identified vulnerabilities, outdated software, or other flaws are submitted as work tasks, with high-priority tasks created for security incidents. We prioritize rapid incident response to mitigate risks effectively.
Incident management type
Undisclosed
Incident management approach
Our incident management processes are adaptable to user requirements. We establish an issue tracker using GitHub or GitLab, granting Buyer team members access to create and manage tickets in a private repository. Incidents can be reported via GitHub, GitLab, email, phone, or web chat. Upon receiving a report, we conduct an investigation to determine necessary actions, providing continual updates on the investigation's status. Once resolved, a final report is communicated via email. This approach ensures transparent and effective incident resolution.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
No

Energy efficiency

Energy-efficient datacentres
Yes
Description of energy efficient datacentres
Datopian leverages cloud infrastructure provided by Google, which aligns with the principles of the EU code of conduct for energy-efficient data centres. Google has made significant investments in sustainable infrastructure and operates some of the most energy-efficient data centres in the world. Their data centres are designed to optimize energy usage, reduce carbon emissions, and maximize efficiency through innovative cooling and power management technologies.

At Datopian, energy-efficient policies are paramount, which is why we have chosen to partner with energy-efficient data centres that facilitate cloud computing. By utilizing these data centres, we not only optimize energy usage but also contribute to reducing carbon pollution and conserving energy for organizations.

We use efficient data centres all over the world designed to harness the natural environment for maximum efficiency. We are confident that through our collective efforts, we can drive towards a more sustainable and energy-efficient future.

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

As a fully remote company, Datopian significantly reduces its carbon footprint by eliminating the need for commuting and maintaining physical offices. We exclusively utilize digital communication methods and advocate for contractors to rely on renewable energy sources for heating, further minimizing environmental impact. Our commitment extends beyond operational practices to include climate change CSR initiatives. Notably, our "State of Carbon" project, spearheaded by President Rufus Pollock, provides open access to carbon dioxide data through the world's first open API for climate change:

The State of Carbon was built by the President of Datopian Rufus Pollock to chart carbon dioxide levels. The chart is powered by the world's first open API for climate change. This enables anyone to enhance NOAAs carbon dioxide data by building charts, sensor networks, and more. The code is open source on Github. Every day, NOAA scientists carefully measure the carbon dioxide in the atmosphere. This important data is public but hard to digest. The aim of the project is to empower everyone around the world to use it.

Additionally, our platform hosts a collection of datasets on climate change, empowering the public and scientific community to drive greater understanding and innovation: https://datahub.io/collections/climate-change.

Our Life Itself Climate Inquiry project (https://climate.lifeitself.us) serves as a comprehensive resource for exploring the climate crisis, inspired by sustainable energy principles. This project started out as a personal investigation of our president Rufus Pollock into the climate crisis. The aim was to document and share a path through this topic. It is heavily inspired and influenced by David Mackay’s Sustainable Energy.

Through these initiatives, Datopian actively contributes to fighting climate change and promoting environmental sustainability.

Covid-19 recovery

Datopian members have initiated open-source projects that help local communities to manage and recover from the impact of COVID-19. Datopian prides itself as an open-source company with a relentless pursuit of sharing and reusing data and working software. We are supporting and promoting open data beyond data catalogs. In regards to the COVID-19 crisis, we created a dynamic dashboard (https://covid19.datahub.io), built using react.js, which shows the total number of cumulative confirmed cases, new cases per day and deaths. One of the key features of this visualisation is that it allows you to select the country of your choice, to check on the latest covid-19 indicators. We also added a table that shows users a country summary and allows users to sort the data. At Datopian we know that there’s so much we can still do to contribute towards our open data ecosystem, that's why we continue to generously invest time and efforts in supporting humanity.

Tackling economic inequality

Datopian actively addresses the digital skills gap by offering support and training opportunities globally. By embracing remote work, we tap into talent from diverse backgrounds, including those who face barriers to employment and/or who are located in deprived areas.

Our philosophy emphasizes discovering and nurturing untapped potential and "undiscovered talents", leading us to offer Apprentice programs and internships to individuals with the right attitude and a willingness to learn. These programs not only provide practical training but also support educational attainment, helping participants gain recognized qualifications.

As part of our Apprentice program and our internships, Datopian provides a rigorous remote training regime which consists of a series of classrooms as well as self-development plans suitable even for junior people with no previous experience. The goal is to develop the apprentices into fully operational Datopian Engineers who can reliably and effectively deliver high-quality work for clients as part of a self-organizing team.

Equal opportunity

At Datopian, we are deeply committed to fostering an inclusive workplace culture where diversity is celebrated and everyone has equal access to opportunities for growth and advancement. We actively seek to reduce barriers to employment by providing support for individuals with disabilities. We prioritize diversity and inclusion in all aspects of our operations, from recruitment and hiring to professional development and advancement. Our recruitment practices prioritize merit and potential, welcoming candidates from diverse linguistic and cultural backgrounds. We offer training and development programs tailored to individual needs, ensuring that all team members have the resources and support necessary to succeed. Through ongoing initiatives and programs, we strive to foster a workplace culture that celebrates diversity and empowers every individual to reach their full potential.

Wellbeing

Promoting the wellbeing of our team members stands as a cornerstone of Datopian's organizational ethos. We prioritize fostering an environment where individuals thrive, both physically and mentally, enabling them to perform at their peak capacity. Our proactive approach to wellbeing encompasses various initiatives designed to support our diverse workforce.

Central to our efforts is the Datopian Wellbeing Guide, a comprehensive resource offering tailored support and guidance. This includes access to country-specific services and cognitive health tips, ensuring individuals have the necessary tools to maintain their wellbeing. Moreover, our commitment extends to promoting inclusivity and challenging negative stereotypes, fostering a culture of respect and understanding among our global team.

At Datopian, we recognize the importance of fostering harmonious relationships and resolving conflicts effectively. Our outlined conflict-resolution strategies empower team members to voice concerns and contribute to a positive work environment. This inclusive approach not only enhances wellbeing but also fosters a culture of collaboration and mutual respect.

Furthermore, we prioritize community engagement through regular online events, ranging from cultural presentations to educational seminars. These initiatives serve to promote camaraderie and strengthen bonds within our organization, further enhancing overall wellbeing and employee satisfaction.

Our commitment to employee wellbeing extends beyond traditional measures. We have implemented innovative initiatives, such as color-coded or numerical wellbeing assessments, where green signifies optimal wellbeing, yellow indicates a moderate state, and orange serves as a strong warning requiring immediate attention to prevent further decline. Red flags potential burnout. This approach empowers individuals to self-assess and communicate their wellbeing status transparently. HR diligently tracks these statuses and offers personalized support and assistance, recognizing the importance of the human aspect in fostering a healthy workplace culture.

Pricing

Price
£499.99 an instance a month
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
TBD

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at contact@datopian.com. Tell them what format you need. It will help if you say what assistive technology you use.