Data Maturity Assessment
Advanced data maturity software to comprehensively assess your organisation’s data management capabilities, with precise and actionable insights so that you have a roadmap to create value, reduce inefficiencies and mitigate data-related risks.
Features
- End-to-end data maturity assessment software
- Comprehensive framework measuring 56 data management capabilities
- Results are updated in real-time
- Enterprise-wide or targeted view of data management capabilities
- Comprehensive analysis based on thousands of data points
- Repeatable, comparable and scalable solution
- Detailed outputs for each capability, role and function
- Interactive outputs for easy analysis and reporting
- Actionable findings and recommendations
- Easy onboarding and setup within minutes
Benefits
- A roadmap to improve the organisation’s management of data
- Precise identification of problem areas across roles and functions
- Highlights strategic, operational and technical data management pain points
- Identifies capabilities inhibiting value creation and those creating waste
- Identifies enterprise data risks that need to be managed
- Provides a repeatable and comparable assessment to track progress
- Informs the business case for investment in data
- Enables data teams to prioritise improvements efficiently
Pricing
£40,000 a licence a year
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
5 4 2 0 1 2 1 5 9 9 4 7 7 1 4
Contact
Anmut Consulting
Simon Ferriter
Telephone: 07500097785
Email: simon.ferriter@anmut.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- None.
- System requirements
-
- Modern web browser.
- JavaScript enabled.
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Within two hours from 9am to 5pm on weekdays.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- Users can send text messages, GIFs, Emojis or attachments.
- Web chat accessibility testing
- None.
- Onsite support
- Onsite support
- Support levels
- We provide a standard support level included in the cost of the software. The support includes a customer success manager to ensure smooth onboarding, as well as ongoing technical support via telephone, email or web chat as needed.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We provide a dedicated customer service representative who onboards the administrator(s). We also provide product tours within the software and more detailed user documentation.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- Other
- Other documentation formats
- Support documentation embedded in the help tool
- End-of-contract data extraction
- A data extract of all results is provided in CSV format.
- End-of-contract process
-
If the software subcription is not renewed, the user will be provided with a data extract of the results in CSV format. This is included in the price of the software.
Alternative options can be discussed and agreed with the user. Depending on the user's requirements there may be additional costs involved.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- None.
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- No
- Customisation available
- Yes
- Description of customisation
- Admin users can customise the attributes of their organisation (e.g. name, departments and data assets) by using the interface included in the software.
Scaling
- Independence of resources
- We follow a serverless architecture, providing flexible horizontal scaling, regardless of spikes in usage.
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- No
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Users can request to have their data exported at the end of their software subscription period.
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- Anmut provides up to 99.99% availability. All availability requirements, including SLAs are agreed with customers in line with their individual requirements.
- Approach to resilience
- Available on request.
- Outage reporting
- Email alerts will be sent to users with administrator rights.
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Other
- Other user authentication
- Email link authentication
- Access restrictions in management interfaces and support channels
- We have different user types with varying permissions.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
- Other
- Description of management access authentication
- Email link authentication
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- Between 1 month and 6 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- Between 1 month and 6 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- Anmut's policies are aligned to ISO:27001 and we have a systematic approach to the management of sensitive company information.
- Information security policies and processes
- Anmut has detailed policies for information security developed by our Information Security Officer, with ultimate responsibility resting with the Chief Executive Officer.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
We maintain an inventory of all service components for transparency and control.
Changes to software components are tracked using version control systems, allowing for audits and rollbacks.
Components undergo periodic reviews for performance, security, and compliance, with proactive management of end-of-life processes.
All changes are evaluated for potential security impacts by our security team.
Potential security risks are assessed for severity and likelihood, with mitigation strategies developed before change approval.
Significant changes are tested in controlled environments for security and functionality before deployment.
Changes are monitored for security issues, with rapid response measures in place. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
We utilise continuous surveillance tools for identifying and assessing vulnerabilities in real-time.
We analyse the severity and potential impact of detected vulnerabilities, focusing on possibility of exploitation and potential costs.
We prioritise patches based on criticality, deploying critical updates within 24 hours.
We automate deployment of patches through CI/CD practices to reduce human error.
We implement thorough automated and manual testing in a controlled environment before deploying.
We receive our information on threats from Security Advisories, automated scanners and tooling, and community discussions to keep up to date on the latest vulnerabilities. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
Continuous Monitoring tools allow us to track the system with logs and network activity, analysing for suspicious activity.
Our incident response team is ready to investigate the severity, scope and impact of any possible compromises immediately.
This is followed by containment and mitigation efforts to limit exposure, root cause analysis, then communication and reporting.
We aim to begin containment within minutes of alert, with high-severity incidents taking priority. - Incident management type
- Supplier-defined controls
- Incident management approach
-
We have developed and documented processes for managing a range of common security events.
We provide several channels for users to report incidents, including a dedicated security email, live web chat, and a secure web portal.
A report including an executive summary, chronology, and findings of any investigation will be shared with relevant stakeholders, affected parties, and regulatory bodies, as indicated by any SLAs and compliance obligations.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Equal opportunity
Fighting climate change
Our headcount has grown by more than 50% per year on average since 2018. Given this growth rate, it is not appropriate to set a total emissions target, but a carbon intensity target. Therefore, we have set a target of keeping our carbon intensity below our 2021/22 level of 149 kg CO2e per FTE. In addition, we have committed to offsetting all our emissions through Gold Standard-certified projects. This means we currently produce net zero emissions.
Our environmental protection approach is built around the following policies: 1. Consider environmental factors in our business decisions.
2. Minimise the consumption and wastage of natural resources as far as reasonably practicable. 3. Dispose of all waste according to the principles of the waste hierarchy. 4. Actively promote a hybrid workspace model both in terms of our own business delivery and project delivery with clients. 5. Actively seek opportunities to work with clients to help them reduce their emissions. 6. Fulfil all environmental compliance obligations, including laws, regulations, and other requirements.Equal opportunity
We use an industry-recognised 6-pillar framework to guide our EDI policies and actions to promote equal opportunities. Our target is to exceed industry benchmarks in each of the EDI measures we track. Our EDI policies are written in full within our Employee Handbook.
Below is a summary of our EDI policies.
1. Diversity and integrated differences: Visa sponsorship programme to support a culturally diverse workforce, Diversity targets for our recruitment partner, including 50% female candidates per role, Unconscious bias training, Encourage speakers from within industry, including clients, to share good practices and raise awareness. 2. Fairness: A culture of feedback throughout the year, which feeds into a transparent appraisal process against objective competencies, behaviours, values and pay bands, Flexible working patterns to encourage work-life balance and improve access for all. 3. Belonging: Women’s network – to support women in the workplace, Workplace Adaptations Agreement – to encourage and support inclusion for people with disabilities. 4. Trust: Emphasis upon continuous feedback that is embedded into our delivery lifecycle and our internal operating model, Regular staff pulse surveying to capture anonymous feedback on health, wellbeing, and satisfaction within the workplace.
5. Decision Making: Blind CV reviews to eliminate selection bias, Collaborative decision-making informed by open staff feedback.
6. Psychological safety: Wellbeing Team, including certified Mental Health First Aiders, Company-funded psychotherapist - removes financial barriers to accessing mental health support.
Pricing
- Price
- £40,000 a licence a year
- Discount for educational organisations
- No
- Free trial available
- No