Skip to main content

Help us improve the Digital Marketplace - send your feedback

Anmut Consulting

Data Maturity Assessment

Advanced data maturity software to comprehensively assess your organisation’s data management capabilities, with precise and actionable insights so that you have a roadmap to create value, reduce inefficiencies and mitigate data-related risks.

Features

  • End-to-end data maturity assessment software
  • Comprehensive framework measuring 56 data management capabilities
  • Results are updated in real-time
  • Enterprise-wide or targeted view of data management capabilities
  • Comprehensive analysis based on thousands of data points
  • Repeatable, comparable and scalable solution
  • Detailed outputs for each capability, role and function
  • Interactive outputs for easy analysis and reporting
  • Actionable findings and recommendations
  • Easy onboarding and setup within minutes

Benefits

  • A roadmap to improve the organisation’s management of data
  • Precise identification of problem areas across roles and functions
  • Highlights strategic, operational and technical data management pain points
  • Identifies capabilities inhibiting value creation and those creating waste
  • Identifies enterprise data risks that need to be managed
  • Provides a repeatable and comparable assessment to track progress
  • Informs the business case for investment in data
  • Enables data teams to prioritise improvements efficiently

Pricing

£40,000 a licence a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at simon.ferriter@anmut.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

5 4 2 0 1 2 1 5 9 9 4 7 7 1 4

Contact

Anmut Consulting Simon Ferriter
Telephone: 07500097785
Email: simon.ferriter@anmut.co.uk

Service scope

Software add-on or extension
No
Cloud deployment model
Public cloud
Service constraints
None.
System requirements
  • Modern web browser.
  • JavaScript enabled.

User support

Email or online ticketing support
Email or online ticketing
Support response times
Within two hours from 9am to 5pm on weekdays.
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
Users can send text messages, GIFs, Emojis or attachments.
Web chat accessibility testing
None.
Onsite support
Onsite support
Support levels
We provide a standard support level included in the cost of the software. The support includes a customer success manager to ensure smooth onboarding, as well as ongoing technical support via telephone, email or web chat as needed.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We provide a dedicated customer service representative who onboards the administrator(s). We also provide product tours within the software and more detailed user documentation.
Service documentation
Yes
Documentation formats
  • HTML
  • Other
Other documentation formats
Support documentation embedded in the help tool
End-of-contract data extraction
A data extract of all results is provided in CSV format.
End-of-contract process
If the software subcription is not renewed, the user will be provided with a data extract of the results in CSV format. This is included in the price of the software.

Alternative options can be discussed and agreed with the user. Depending on the user's requirements there may be additional costs involved.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
None.
Service interface
No
User support accessibility
None or don’t know
API
No
Customisation available
Yes
Description of customisation
Admin users can customise the attributes of their organisation (e.g. name, departments and data assets) by using the interface included in the software.

Scaling

Independence of resources
We follow a serverless architecture, providing flexible horizontal scaling, regardless of spikes in usage.

Analytics

Service usage metrics
No

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
No
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
In-house
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
No
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Users can request to have their data exported at the end of their software subscription period.
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Anmut provides up to 99.99% availability. All availability requirements, including SLAs are agreed with customers in line with their individual requirements.
Approach to resilience
Available on request.
Outage reporting
Email alerts will be sent to users with administrator rights.

Identity and authentication

User authentication needed
Yes
User authentication
Other
Other user authentication
Email link authentication
Access restrictions in management interfaces and support channels
We have different user types with varying permissions.
Access restriction testing frequency
At least every 6 months
Management access authentication
Other
Description of management access authentication
Email link authentication

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
Between 1 month and 6 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
Between 1 month and 6 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
Anmut's policies are aligned to ISO:27001 and we have a systematic approach to the management of sensitive company information.
Information security policies and processes
Anmut has detailed policies for information security developed by our Information Security Officer, with ultimate responsibility resting with the Chief Executive Officer.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
We maintain an inventory of all service components for transparency and control.
Changes to software components are tracked using version control systems, allowing for audits and rollbacks.
Components undergo periodic reviews for performance, security, and compliance, with proactive management of end-of-life processes.

All changes are evaluated for potential security impacts by our security team.
Potential security risks are assessed for severity and likelihood, with mitigation strategies developed before change approval.
Significant changes are tested in controlled environments for security and functionality before deployment.
Changes are monitored for security issues, with rapid response measures in place.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
We utilise continuous surveillance tools for identifying and assessing vulnerabilities in real-time.
We analyse the severity and potential impact of detected vulnerabilities, focusing on possibility of exploitation and potential costs.

We prioritise patches based on criticality, deploying critical updates within 24 hours.
We automate deployment of patches through CI/CD practices to reduce human error.
We implement thorough automated and manual testing in a controlled environment before deploying.

We receive our information on threats from Security Advisories, automated scanners and tooling, and community discussions to keep up to date on the latest vulnerabilities.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Continuous Monitoring tools allow us to track the system with logs and network activity, analysing for suspicious activity.
Our incident response team is ready to investigate the severity, scope and impact of any possible compromises immediately.
This is followed by containment and mitigation efforts to limit exposure, root cause analysis, then communication and reporting.

We aim to begin containment within minutes of alert, with high-severity incidents taking priority.
Incident management type
Supplier-defined controls
Incident management approach
We have developed and documented processes for managing a range of common security events.
We provide several channels for users to report incidents, including a dedicated security email, live web chat, and a secure web portal.
A report including an executive summary, chronology, and findings of any investigation will be shared with relevant stakeholders, affected parties, and regulatory bodies, as indicated by any SLAs and compliance obligations.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Equal opportunity

Fighting climate change

Our headcount has grown by more than 50% per year on average since 2018. Given this growth rate, it is not appropriate to set a total emissions target, but a carbon intensity target. Therefore, we have set a target of keeping our carbon intensity below our 2021/22 level of 149 kg CO2e per FTE. In addition, we have committed to offsetting all our emissions through Gold Standard-certified projects. This means we currently produce net zero emissions.

Our environmental protection approach is built around the following policies: 1. Consider environmental factors in our business decisions.
2. Minimise the consumption and wastage of natural resources as far as reasonably practicable. 3. Dispose of all waste according to the principles of the waste hierarchy. 4. Actively promote a hybrid workspace model both in terms of our own business delivery and project delivery with clients. 5. Actively seek opportunities to work with clients to help them reduce their emissions. 6. Fulfil all environmental compliance obligations, including laws, regulations, and other requirements.

Equal opportunity

We use an industry-recognised 6-pillar framework to guide our EDI policies and actions to promote equal opportunities. Our target is to exceed industry benchmarks in each of the EDI measures we track. Our EDI policies are written in full within our Employee Handbook.

Below is a summary of our EDI policies.

1. Diversity and integrated differences: Visa sponsorship programme to support a culturally diverse workforce, Diversity targets for our recruitment partner, including 50% female candidates per role, Unconscious bias training, Encourage speakers from within industry, including clients, to share good practices and raise awareness. 2. Fairness: A culture of feedback throughout the year, which feeds into a transparent appraisal process against objective competencies, behaviours, values and pay bands, Flexible working patterns to encourage work-life balance and improve access for all. 3. Belonging: Women’s network – to support women in the workplace, Workplace Adaptations Agreement – to encourage and support inclusion for people with disabilities. 4. Trust: Emphasis upon continuous feedback that is embedded into our delivery lifecycle and our internal operating model, Regular staff pulse surveying to capture anonymous feedback on health, wellbeing, and satisfaction within the workplace.
5. Decision Making: Blind CV reviews to eliminate selection bias, Collaborative decision-making informed by open staff feedback.
6. Psychological safety: Wellbeing Team, including certified Mental Health First Aiders, Company-funded psychotherapist - removes financial barriers to accessing mental health support.

Pricing

Price
£40,000 a licence a year
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at simon.ferriter@anmut.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.