Skip to main content

Help us improve the Digital Marketplace - send your feedback

ANALYTIUM LTD

SAS Analytics Platform Remote Hosting

SAS Hosting Service is an excellent option for organisations looking for a comprehensive analytics solution based on SAS industry-leading products by certified SAS partners. Hosted Managed Services gives you the option to deploy the technology on an infrastructure that has been tuned specifically for the solution.

Features

  • Data processing platform that scales to fit your needs
  • Online web interfaces that require no installation
  • In-memory and in-database data processing
  • Open source integration

Benefits

  • Upload data in-batch or via online interface
  • Use mobile or desktop devices
  • Access the software from any modern browser
  • Reduce capital costs by hosting online
  • Reduce outage risk by hosting on redundant hardware
  • Faster time to benefit as software deployed within hours

Pricing

£960 an instance

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at sales@analytium.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

5 2 3 3 2 3 8 9 7 2 6 2 3 4 9

Contact

ANALYTIUM LTD Sales Team
Telephone: +44 20 3574 8313
Email: sales@analytium.com

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
We provide data analytics services alongside of the data analytics software for organisations that would like to buy the software and the team
Cloud deployment model
  • Public cloud
  • Private cloud
Service constraints
The software can be installed only on Windows or Linux hardware
System requirements
  • Minimum 64GB RAM
  • Minimum 4 CPU
  • Only Linux or Windows

User support

Email or online ticketing support
Email or online ticketing
Support response times
Support is available at 24\7, with SLA of up to 4 hours.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
WCAG 2.1 AA or EN 301 549
Web chat accessibility testing
We are using Zendesk. Zendesk software is WCAG 2.1 AA certified.
Onsite support
Yes, at extra cost
Support levels
Additional development on-site time available, subject to location and expertise requirement.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We provide on-site and off-site training, as well as comprehensive user guidance documentation.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
The Service encompasses comprehensive data processing capabilities, that allow users to create data export processes to a wide variety of formats. These capabilities are accessed using the normal user interfaces of the Service.
End-of-contract process
The customer will have an opportunity to download all of their data to their own systems.
The platform will be shut down and all data destroyed at the end of the contract.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Mobile app for Android\Apple are available.
Service interface
No
User support accessibility
WCAG 2.1 AA or EN 301 549
API
Yes
What users can and can't do using the API
SAS REST APIs support application developers, who intend to build on the work of model builders and data scientists, to deliver apps based on SAS.
Users can create and access SAS resources using any client technology, eg Java, Python, JavaScript, C, C#, Perl, or other programming languages. All that is required is a standard library for executing HTTP requests and parsing/generating JSON data.
Users can integrate the capabilities of SAS into business processes or to extend and customise SAS to meet specific requirements, including

Visualisation. Provide access to reports and report images

Compute. Act on SAS compute and analytic servers, including Cloud Analytic Services (CAS)

Text Analytics. Provide analysis and categorisation of text documents

Data Management. Enable data manipulation and data quality operations

Decision Management. Provide access to machine scoring and business rules

Core Services. Provide operations for shared resources eg files and folders

Cloud Analytics Services (CAS) REST APIs primarily supports data scientists, programmers and administrators, who interact with CAS directly and are knowledgeable about CAS actions. The API provides REST access to CAS server and the CAS grid. There are API operations for executing CAS actions, managing the CAS sessions, monitoring the system, and inspecting the CAS grid.
API documentation
Yes
API documentation formats
HTML
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
The technical capabilities offered by the service are fixed. Those capabilities can be used by customers to populate the environment with their own data, and to create reports, dashboard, analytical models and data processing routines to suit their specific requirements.

Scaling

Independence of resources
Analytium offers a service to resize the environment to meet the customer needs and changes in demand.

Analytics

Service usage metrics
Yes
Metrics types
Analytium can provide reports, as appropriate, that display server health and solution availability, such as the following:
- Server up-time
- Disk usage per file system
- Database operational/listener status
- List of user IDs that are currently logged onto the server
- Network interface status
- List of processes currently running
- Total disk usage
- Completion of successful backups
- CPU specifications
- Memory utilisation

Analytium also performs enhanced monitoring, as appropriate, to confirm the effective operation of hosted applications. Checks, which must be non-intrusive, involve navigation and key functionality according to role for each applicable environment.
Reporting types
  • Real-time dashboards
  • Reports on request

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
SAS Institute

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
No
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
The Service encompasses comprehensive data processing capabilities, that allow users to create data export processes to a wide variety of formats. These capabilities are accessed using the normal user interfaces of the Service.
Data export formats
  • CSV
  • Other
Other data export formats
Loaded to other supported RDBMS
Data import formats
  • CSV
  • Other
Other data import formats
Loaded from majority RDBMS

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
As part of the service Analytium offers a 99% up-time warranty .
Analytium offers service credits if you are effected by any outage
Approach to resilience
The Cloud Service provider has identified critical system components required to maintain the availability of the system and recover service in the event of outage. Critical system components (example: code bases) are backed up across multiple, isolated locations known as Availability Zones. Each Availability Zone runs on its own physically distinct, independent infrastructure, and is engineered to be highly reliable. Common points of failures like generators and cooling equipment are not shared across Availability Zones. Additionally, Availability Zones are physically separate, and designed such that even extremely uncommon disasters such as fires, tornados or flooding should only affect a single Availability Zone
Outage reporting
Email alerts are provided to the nominated email address. We also support automated text messages and phone calls.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
Analytium restricts access in management interfaces via the use of privileged accounts.

All privileged access requests for users in roles required to support all project must be tracked and include review and approval by requester’s manager.

Privileged access requests for project resources for privileged access to customer-specific hosting environments must also be requested and approved by the project owner or the Analytium resource’s manager.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
We are actively working towards ISO27001 standard. We base our current approach to ISO27001 principals.
Information security policies and processes
Analytium’ strategic business plan and risk management framework provide the context for identifying, assessing, evaluating and controlling information-related risks through the establishment and maintenance of an Information Security Management System (ISMS) Policy.
The risk assessment, Statement of Applicability and risk treatment plan identify how information-related risks are controlled.
The Information Security Manager is responsible for the management and maintenance of the risk treatment plan.
Additional risk assessments may be carried out to determine appropriate controls for specific risks. Fundamental to this policy are business continuity and contingency plans, data back-up procedures, avoidance of viruses and hackers, access control to systems and information security incident reporting.
Control objectives are contained in specific, documented policies and procedures.
All employees of Analytium and certain external parties are expected to comply with this policy and will receive appropriate training.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Analytium's policy is to utilise standardised, effective methods and processes for requesting, implementing and communicating change practices. Respective owning departments manage change management and maintenance of systems.

Analytium's adheres to defined change management processes and procedures based on hosting customer requirements.

Customers or Analytium can request changes based on required functionality or maintenance of the hosted environment, a Change Advisory Board (CAB) manages changes to the Analytium's environment. Changes are tracked using ticketing systems. After a change is completed, the security function of the solution is checked to verify that the functions are implemented correctly and operating as intended.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Analytium maintains subscriptions to vulnerability alerting services and monitors these lists for new vulnerabilities affecting the organisation. An assessment of impact is performed for vulnerabilities with a criticality of Critical or higher.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
It is the policy of Analytium to monitor the availability and performance of each component within a hosted instance using enterprise monitoring applications. These applications provide for operational status and availability of applicable SAS solutions, database instances, networking, and infrastructure, including leveraged services.
Incident management type
Supplier-defined controls
Incident management approach
It is the policy of Analytium to follow incident management best practices to ensure the rapid detection and restoration of services that can occur as a result of unplanned events that effect, or have the potential to effect, the hosting environment, third party data centres, or both.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

Remote hosting reduces the need for physical infrastructure, which can decrease the carbon footprint associated with running analytics operations. This contributes to environmental sustainability efforts, particularly in reducing electronic waste and energy consumption.

Tackling economic inequality

By reducing capital costs and providing a platform that requires no additional hardware, the service makes advanced analytics accessible to a broader range of organizations, including small and medium enterprises (SMEs) and startups. This can help reduce economic disparities by enabling these organizations to compete on a more level playing field with larger companies.

Equal opportunity

The service's online interfaces and compatibility with mobile devices ensure that it is accessible to a wide range of users, including those who may have limited access to traditional desktop computing resources. This can help bridge the digital divide and provide equal opportunities for individuals to access and utilize advanced data analytics tools.

Wellbeing

The feature of hosting on redundant hardware reduces outage risks, which can contribute to better user experience and less stress for those dependent on these systems for their operational needs.

Pricing

Price
£960 an instance
Discount for educational organisations
Yes
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at sales@analytium.com. Tell them what format you need. It will help if you say what assistive technology you use.