Skip to main content

Help us improve the Digital Marketplace - send your feedback

IOCO SOLUTIONS LIMITED

Informatica Data Management Platform

Industry leading Data Management from Informatica enables data from any systems to be centrally controlled enables Data Quality, Data Integration, Master Data Management and Data Cataloging. Provides data matching, history, workflow, security and centralised access to core data assets.

Features

  • Data Integration, Architecture and Modelling
  • Data Governance
  • Master Data Management
  • Data Cataloging
  • Prebuilt 360 solutions, data models, governance, workflows, and accelerators
  • View of data asset history and audit trail
  • Fully flexible and extensible data model, scalable for high volumes
  • Informatica MDM solutions implemented in many Public Sector organisations globally
  • User friendly thin client user interface
  • Intelligent data matching

Benefits

  • Full data audit and data lineage
  • Full hierarchical view of core data designed for non-technical users
  • Rapid time to value
  • Data snapshot at point in time
  • Single view of client, product, employee, supplier etc.
  • Provide validated and standardised data for operational and analytical processes
  • Prevention against fraud, prevent duplicate payments
  • Full hierarchical view of core data designed for non-technical users
  • Single Platform covering DI, DQ, MDM

Pricing

£8,100 an instance a month

  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at michael.morey@ioco.tech. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

5 3 7 4 7 2 3 0 0 8 2 1 7 7 2

Contact

IOCO SOLUTIONS LIMITED Mick Morey
Telephone: 0118 206 2938
Email: michael.morey@ioco.tech

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Each component within the Informatica suite of products can be used stand alone:
Informatica DQ
Informatica ID
Informatica MDM
Informatica EDC
Informatica DG

These products integrate exceptionally well to form a single Data Management Platform.
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints
A light weight application called a Secure Agent needs to be installed on a server (this could be on an on-premise server, or on an AWS or MS Azure server) in order to process the integration data.
System requirements
  • MS Windows or Linux operating systems
  • Microsoft SQL Server, Oracle Database or IBM DB2
  • Requirements are for modules hosted outside of Informatica cloud services

User support

Email or online ticketing support
Email or online ticketing
Support response times
Support response times
Severity 1 - 1 Hour,
Severity 2 - 4 hours,
Severity 3 - 8 hours,
Severity 4 - 1 Business Day or as per service catalog
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
The Managed Cloud Service is fully supported by iOCO's24/7 Service Desk providing a single point of access for all incidents and requests. The service is available via telephone, email or iOCO portal. Responses are prioritised and addressed in line with the service levels detailed in the Service Level Agreement document.
All engagements have a named Service Manager for engagement and escalations with a Technical Service Manager who attend service review meetings.
Support available to third parties
No

Onboarding and offboarding

Getting started
Onsite or online training is available for the solution and a Getting started full set of documentation is provided with an online Help Center. iOCO would also provide project-based services to help our customers get their Informatica environment(s) designed and built for purpose.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
All user data can be exported from the environment at any stage, including when the contract ends.
All user data hosted by Informatica can be completely purged when the contract ends.
End-of-contract process
The customer's licenses on the organisation to access the service are removed and no users can access the application.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Firefox
  • Chrome
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
  • Linux or Unix
  • Windows
Designed for use on mobile devices
No
Service interface
Yes
User support accessibility
None or don’t know
Description of service interface
Master Data Management (MDM) and Informatica Data Quality (IDQ) has a flexible user interface which allows for creating configurable user interface that could be associated with workflow tasks and user actions. In addition, it allows for dashboard creation that can be assigned to home pages based on user roles. It also has a flexible data model for attribute creation, rule engine to create and configure new rules as well as enterprise workflow engine to create and configure processes.
Browser-based clients leverage the accessibility features within the browser and within the users operating systems.
Accessibility standards
None or don’t know
Description of accessibility
N/A
Accessibility testing
N/A
API
Yes
What users can and can't do using the API
All integration mappings and services, as well as monitoring services are exposed over the ReST API. All users with access to the tool, will also have access to the API.
API documentation
Yes
API documentation formats
PDF
API sandbox or test environment
Yes
Customisation available
No

Scaling

Independence of resources
The iOCO Cloud and Informatica platform is high availability by design with 24x7 monitoring to identify any event driven impacts on end user service whilst allowing on demand scaling of compute resources.

Analytics

Service usage metrics
Yes
Metrics types
Operational Insights provides metrics on number of integration jobs run and their performance. Global performance statistics are available publicly on our trust site.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Informatica

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Scale, obfuscating techniques, or data storage sharding
  • Other
Other data at rest protection approach
The application has been built to vendor requirements, as such there is no OS or DB level encryption beyond user / password access. The application has obfuscated passwords within the databases. There are options available for encryption of data on DB and OS level, though these come with not insignificant performance hits so we would have to consider increasing resource and cost if this was needed e.g.
PostgresSQL - CyberTec Instance Level Encryption
Centos NFS - Encrypted File System
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Depending on which product out of the Informatica suite is in use, there are many ways to export and import data within Informatica.
Data export formats
  • CSV
  • Other
Other data export formats
  • XML
  • XLS
  • JSON
  • EDI
  • HL-7
Data import formats
  • CSV
  • Other
Other data import formats
  • XML
  • JSON
  • EDI
  • HL-7
  • XLS

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
Other
Other protection within supplier network
Client-to-Site (SSL) VPN connectivity that allows the customer’s administrators to access the private IP addresses of the Workloads through a secure, encrypted tunnel.
Built into the Virtual Cloud Management application. Full network and firewall segregation achieved with Virtualization, Network and security controls.
The application is multi-tenanted. There is a back office management layer where tenants and users are setup. A back office admin user does not by default have access to a tenant. The tenant admin has access to report on any action taken within their own tenant.

Availability and resilience

Guaranteed availability
SLA - 99.9% availability. If iOCO service fails to meet this key objective in a given calendar month, 5% of prorated monthly cloud service fee will be refunded directly to the customer account within 30 days.
Approach to resilience
Data Centres have a high resilience setup:
• Highly secure, Tier 4 data centre environment
• Dual power circuits with UPS
• Backup power generators
• Constant environmental monitoring
• Dual network and redundant data fabric
• Software-defined storage services
• Converged and hyper-converged infrastructure
• On-going capacity planning
Application is built upon a containerised architecture. This is able to redeploy services on available hardware if it senses that an issue has occurred.
Outage reporting
Dependent on customer requirements, outages can be accessed via Public URL, or notified by telephone and/or email alerts.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
The application is multi-tenanted. There is a back office management layer where tenants and users are setup. Application back office administrators are named and limited in number. A back office admin user does not by default have access to a tenant. By adding themselves to a tenant, this account only has very basic permissions to raise new requests and view your own requests only. The tenant admin has access to report on any action taken within their own tenant.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
Yes
Any other security certifications
INFORMATION SECURITY MANAGEMENT SYSTEM ISO/IEC 27001:2013 for the Datacentre

Security governance

Named board-level person responsible for service security
No
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Security is managed at three levels: Infrastructure, Environment, Customer. iOCO Cloud team are wholly responsible for Infrastructure security, governing DC / Hardware, Network and Security devices. iOCO Application Management team is responsible for managing the environment where the application is running - for example building and hardening the application to vendor recommendations. Customer is responsible for in-application security.(e.g. user role access) and the security of on-premise components that maybe required for integration purposes.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
The change management processes follow ISO27001 A.12.1.2 controlled mechanism for making changes to operational environments.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
We subscribe to multiple vendor provided vulnerability
notification services. All vulnerabilities are reviewed and applicable patches are administered through the change control process . Mitigation measures will always be considered first, with critical patches targeted for resolution within 30 days.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Denial of Service is applied on all Internet links , with Intrusion detection\protection available to customers on request. All security events are logged\notified based on severity. Any attempted platform security compromises are dealt with 24/7 by security engineers. The responsibility remains with the customer to ensure detected intrusions are re-mediated where customershavecontrol,permission,oraccesstomodifytheir service. iOCO recommends that customers follow security best practices including, but not limited to:
• Maintaining effective firewall rules
• Limiting the communication ports to only the necessary, for conducting business
• Locking down access
Incident management type
Supplier-defined controls
Incident management approach
The incident response process complies with industry standards for legally admissible chain-of-custody and forensic data collection management processes and controls. Response standards, procedures, and methods are implemented based on the severity level of an incident. Incident reports are produced as part of standard post incident process and provided to customers on request.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

Fighting climate change

Fighting climate change

As the Informatica Data Management Platform can be a hosted cloud solution and can sit either on premise, in a private or a public cloud or with Informatica as a SaaS solution, the solution can adhere to the sustainability policy of the environment on which it is hosted. These would typically be in line with either the UK Government policy in the case of on-premise or the public or private cloud providers, or Informatica themselves. They will all have their own sustainability and GreenOps targets that they will need to adhere to.

Pricing

Price
£8,100 an instance a month
Discount for educational organisations
No
Free trial available
Yes
Description of free trial
It would be dependent on which product in the Informatica suite is being deployed. Data Management projects are usually organisation-wide, affecting multiple parts of a business. Any trial will need to evaluate both the technology and the necessary business process changes to take place.
Link to free trial
Download link available on request

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at michael.morey@ioco.tech. Tell them what format you need. It will help if you say what assistive technology you use.