SAS Analytics Platform Remote Hosting
SAS Hosting Service is an excellent option for organisations looking for a comprehensive analytics solution based on SAS industry-leading products by certified SAS partners. Hosted Managed Services gives you the option to deploy the technology on an infrastructure that has been tuned specifically for the solution.
Features
- Data processing platform that scales to fit your needs
- Online web interfaces that require no installation
- In-memory and in-database data processing
- Open source integration
Benefits
- Upload data in-batch or via online interface
- Use mobile or desktop devices
- Access the software from any modern browser
- Reduce capital costs by hosting online
- Reduce outage risk by hosting on redundant hardware
- Faster time to benefit as software deployed within hours
Pricing
£960 an instance
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
5 2 3 3 2 3 8 9 7 2 6 2 3 4 9
Contact
ANALYTIUM LTD
Sales Team
Telephone: +44 20 3574 8313
Email: sales@analytium.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- We provide data analytics services alongside of the data analytics software for organisations that would like to buy the software and the team
- Cloud deployment model
-
- Public cloud
- Private cloud
- Service constraints
- The software can be installed only on Windows or Linux hardware
- System requirements
-
- Minimum 64GB RAM
- Minimum 4 CPU
- Only Linux or Windows
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Support is available at 24\7, with SLA of up to 4 hours.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web chat accessibility testing
- We are using Zendesk. Zendesk software is WCAG 2.1 AA certified.
- Onsite support
- Yes, at extra cost
- Support levels
- Additional development on-site time available, subject to location and expertise requirement.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We provide on-site and off-site training, as well as comprehensive user guidance documentation.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- The Service encompasses comprehensive data processing capabilities, that allow users to create data export processes to a wide variety of formats. These capabilities are accessed using the normal user interfaces of the Service.
- End-of-contract process
-
The customer will have an opportunity to download all of their data to their own systems.
The platform will be shut down and all data destroyed at the end of the contract.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Mobile app for Android\Apple are available.
- Service interface
- No
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- API
- Yes
- What users can and can't do using the API
-
SAS REST APIs support application developers, who intend to build on the work of model builders and data scientists, to deliver apps based on SAS.
Users can create and access SAS resources using any client technology, eg Java, Python, JavaScript, C, C#, Perl, or other programming languages. All that is required is a standard library for executing HTTP requests and parsing/generating JSON data.
Users can integrate the capabilities of SAS into business processes or to extend and customise SAS to meet specific requirements, including
Visualisation. Provide access to reports and report images
Compute. Act on SAS compute and analytic servers, including Cloud Analytic Services (CAS)
Text Analytics. Provide analysis and categorisation of text documents
Data Management. Enable data manipulation and data quality operations
Decision Management. Provide access to machine scoring and business rules
Core Services. Provide operations for shared resources eg files and folders
Cloud Analytics Services (CAS) REST APIs primarily supports data scientists, programmers and administrators, who interact with CAS directly and are knowledgeable about CAS actions. The API provides REST access to CAS server and the CAS grid. There are API operations for executing CAS actions, managing the CAS sessions, monitoring the system, and inspecting the CAS grid. - API documentation
- Yes
- API documentation formats
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- The technical capabilities offered by the service are fixed. Those capabilities can be used by customers to populate the environment with their own data, and to create reports, dashboard, analytical models and data processing routines to suit their specific requirements.
Scaling
- Independence of resources
- Analytium offers a service to resize the environment to meet the customer needs and changes in demand.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Analytium can provide reports, as appropriate, that display server health and solution availability, such as the following:
- Server up-time
- Disk usage per file system
- Database operational/listener status
- List of user IDs that are currently logged onto the server
- Network interface status
- List of processes currently running
- Total disk usage
- Completion of successful backups
- CPU specifications
- Memory utilisation
Analytium also performs enhanced monitoring, as appropriate, to confirm the effective operation of hosted applications. Checks, which must be non-intrusive, involve navigation and key functionality according to role for each applicable environment. - Reporting types
-
- Real-time dashboards
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- SAS Institute
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- No
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- The Service encompasses comprehensive data processing capabilities, that allow users to create data export processes to a wide variety of formats. These capabilities are accessed using the normal user interfaces of the Service.
- Data export formats
-
- CSV
- Other
- Other data export formats
- Loaded to other supported RDBMS
- Data import formats
-
- CSV
- Other
- Other data import formats
- Loaded from majority RDBMS
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
As part of the service Analytium offers a 99% up-time warranty .
Analytium offers service credits if you are effected by any outage - Approach to resilience
- The Cloud Service provider has identified critical system components required to maintain the availability of the system and recover service in the event of outage. Critical system components (example: code bases) are backed up across multiple, isolated locations known as Availability Zones. Each Availability Zone runs on its own physically distinct, independent infrastructure, and is engineered to be highly reliable. Common points of failures like generators and cooling equipment are not shared across Availability Zones. Additionally, Availability Zones are physically separate, and designed such that even extremely uncommon disasters such as fires, tornados or flooding should only affect a single Availability Zone
- Outage reporting
- Email alerts are provided to the nominated email address. We also support automated text messages and phone calls.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
-
Analytium restricts access in management interfaces via the use of privileged accounts.
All privileged access requests for users in roles required to support all project must be tracked and include review and approval by requester’s manager.
Privileged access requests for project resources for privileged access to customer-specific hosting environments must also be requested and approved by the project owner or the Analytium resource’s manager. - Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- We are actively working towards ISO27001 standard. We base our current approach to ISO27001 principals.
- Information security policies and processes
-
Analytium’ strategic business plan and risk management framework provide the context for identifying, assessing, evaluating and controlling information-related risks through the establishment and maintenance of an Information Security Management System (ISMS) Policy.
The risk assessment, Statement of Applicability and risk treatment plan identify how information-related risks are controlled.
The Information Security Manager is responsible for the management and maintenance of the risk treatment plan.
Additional risk assessments may be carried out to determine appropriate controls for specific risks. Fundamental to this policy are business continuity and contingency plans, data back-up procedures, avoidance of viruses and hackers, access control to systems and information security incident reporting.
Control objectives are contained in specific, documented policies and procedures.
All employees of Analytium and certain external parties are expected to comply with this policy and will receive appropriate training.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Analytium's policy is to utilise standardised, effective methods and processes for requesting, implementing and communicating change practices. Respective owning departments manage change management and maintenance of systems.
Analytium's adheres to defined change management processes and procedures based on hosting customer requirements.
Customers or Analytium can request changes based on required functionality or maintenance of the hosted environment, a Change Advisory Board (CAB) manages changes to the Analytium's environment. Changes are tracked using ticketing systems. After a change is completed, the security function of the solution is checked to verify that the functions are implemented correctly and operating as intended. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Analytium maintains subscriptions to vulnerability alerting services and monitors these lists for new vulnerabilities affecting the organisation. An assessment of impact is performed for vulnerabilities with a criticality of Critical or higher.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- It is the policy of Analytium to monitor the availability and performance of each component within a hosted instance using enterprise monitoring applications. These applications provide for operational status and availability of applicable SAS solutions, database instances, networking, and infrastructure, including leveraged services.
- Incident management type
- Supplier-defined controls
- Incident management approach
- It is the policy of Analytium to follow incident management best practices to ensure the rapid detection and restoration of services that can occur as a result of unplanned events that effect, or have the potential to effect, the hosting environment, third party data centres, or both.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Remote hosting reduces the need for physical infrastructure, which can decrease the carbon footprint associated with running analytics operations. This contributes to environmental sustainability efforts, particularly in reducing electronic waste and energy consumption.Tackling economic inequality
By reducing capital costs and providing a platform that requires no additional hardware, the service makes advanced analytics accessible to a broader range of organizations, including small and medium enterprises (SMEs) and startups. This can help reduce economic disparities by enabling these organizations to compete on a more level playing field with larger companies.Equal opportunity
The service's online interfaces and compatibility with mobile devices ensure that it is accessible to a wide range of users, including those who may have limited access to traditional desktop computing resources. This can help bridge the digital divide and provide equal opportunities for individuals to access and utilize advanced data analytics tools.Wellbeing
The feature of hosting on redundant hardware reduces outage risks, which can contribute to better user experience and less stress for those dependent on these systems for their operational needs.
Pricing
- Price
- £960 an instance
- Discount for educational organisations
- Yes
- Free trial available
- No