Secure Data Environment (Federated Platform)
An on-premises federated data infrastructure product designed to harmonize Trust's databases according to the Observational Medical Outcomes Partnership data model (OMOP-CDM), providing access to a catalogue of analytics. The secure environment together with harmonization enables authorized users to conduct federated studies on Trust's health data, without compromising data privacy.
Features
- OMOP Data Harmonization
- Standard analytics catalog
- Outcomes benchmarking
- Federated data network (FDN)
- Consent management and oversight platform for FDN
- Cohort definitions
- Studies and collaborations
- Real-world evidence (RWE) generation & sharing
Benefits
- Infrastructure Burden Removal
- Secure and trustable by design
- Management and oversight of deployment across different environments
- Harmonization streamlines data to multi-centric studies
- Access to an analytical environment with standardized insights and outcomes
- Inclusion in a collaborative network enabling multi-centric federated studies
Pricing
£65,000 a licence
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
5 9 5 8 8 0 8 2 2 2 9 5 9 8 4
Contact
Promptly Health
Michelle Waddell
Telephone: +447826726323
Email: michelle.waddell@promptlyhealth.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- Database applications, Business Intelligence services
- Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
- As far as we are concerned, no.
- System requirements
-
- Hard drives: Use SSD NVMe drives
- CPU: Choose CPUs with a recent architecture (<5 years)
- VCPU: 2 * RAM: 2 GiB
- Disk: 50 GiB
- Worker Nodes: * vCPU: 16 * RAM: 16 GiB
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
"Support is conducted through email. All incidents should be recorded in the Helpscout support tool which will include information on the affected assets, the classification based on urgency level, service impact, and on the priority for incident resolution. The role of the technical team is to analyze and solve any problem, incident, or request raised by the end user.
SLAs: First Reply Time –Critical Failures <4h (BH*); Non-critical failures <8h (BH); Configurations and Service definition and features improvement/suggestions <24h (BH); Time to recovery –Critical failures <20h (BH); Non-critical failures <16h (BH);
BH = Business hours - User can manage status and priority of support tickets
- No
- Phone support
- No
- Web chat support
- No
- Onsite support
- Onsite support
- Support levels
-
Onsite support is guaranteed and provided in the most critical phases of the Promptly SDE Activation: (1) Preparation for Go-Live: Setup of the solution to align and prepare the go-live;
(2) Go-Live: the platform is tested and ready to be used by the trust.
Maintenance and Ongoing support is also a critical milestone of our implementation process. This phase involves the follow-up of the project after the go-live. In addition to field follow-up (onsite support, to be agreed with the trust), monitoring, and remote support, the first data analysis sessions and improvement cycles will be held together.
The role of the technical team is to analyze and solve any problem, incident, or request raised by the end user. - Support available to third parties
- No
Onboarding and offboarding
- Getting started
-
Theoretical training via documentation of every step of the process.
Practical training where the end-users can get in touch and experiment with the application, having to complete a set of use cases that go over the most important components of the system.
Support via communication with both technical and clinical team members, namely in the analytical module. - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- This is discussed with clients at contract start
- End-of-contract process
-
Promptly Secure Data Environment (SDE) is implemented in the client premises so all the data is available inside the client infrastruture. If the contract is terminated, the harmonized database will remain in place. The infrastructure and software that performs the harmonization will be removed from the client's infrastructure.
PROMPTLY commits to designing and executing an exit management plan within the Business Continuity Plan when issued a formal termination under the agreement and commits to provide it at least four months prior to the end of the contract term agreed. The principle of the exit plan will be to facilitate an effective and smooth transition of the services from PROMPTLY to the Buyer, assuring the minimum disruption of the services and the efficient completion of all agreement obligations.
Non-PII data that is transfered to PROMPTLY as a part of service operation such as logging and monitoring will be removed according to industry standards and the Business Continuity Plan agreed with the client.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- Yes
- Compatible operating systems
- Linux or Unix
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 A
- Description of service interface
- Optionally, the analytical dashboard components can be deployed on-premise and accessed via browser. It will diosplay the standard analytics catalog described above in insights similar to a business intelligence (BI) platform. However, the deployment is flexible and the client can opt to use its own BI tool.
- Accessibility standards
- WCAG 2.1 A
- Accessibility testing
- None
- API
- No
- Customisation available
- Yes
- Description of customisation
-
Promptly SDE is customizable in terms of deployment and modularity.
Deployment: by following BYOC approach, the service can be deployd in a private, public or hybrid cloud. The service was also designed to avoid any possible constraints in terms of setup and be accessible to any client, independently of their infrastructure
Modularity: the harmonization module contains different connectors that allow it to perform the harmonization process in the DBMS of the client, taking advantage of the infrastructure already in place or by implementing an on-premise datalake in the prefered DBMS.
The analytical module can also take advantage of the client's infrastructure already in place by connecting to other BI platforms or, on the other hand, provide access to Promptly's analytical dashboard tool.
Scaling
- Independence of resources
- The service provides automatic scaling to accommodate demand
Analytics
- Service usage metrics
- Yes
- Metrics types
-
"The control plane associated with the on-premise deployment will provide metrics related to the infrastructure such as:
- Resource usage
- Service stability
- Harmonization process monitoring at every step
- Data quality monitoring" - Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
- Physical access control, complying with CSA CCM v3.0
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Data does not leave the premises of the data partner.
- Data export formats
- Other
- Other data export formats
- Not-Applicable
- Data import formats
- Other
- Other data import formats
- Not-applicable
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
Due to the SDE on-premise deployment, availability is also dependent on the client's infrastructure which is defined in detail during contract.
For Promptly managed services, availability is 99.8%.
Allowable downtime is less than 1hr 27 minutes in any given month with no roll over. - Approach to resilience
- Our solution is architected with high availability architecture practices with redundant services across multiple availability zones. Nevertheless, Promptly has a comprehensive disaster recovery (DR) plan in place to ensure that all its systems can continue operating in the event of a major outage or other disruptive event. This is included in our ISO27001 certification. Promptly deploys all services across multiple Availability Zones for fault tolerance and low latency.
- Outage reporting
- Through a public dashboard
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Username or password
- Other
- Other user authentication
- On Promptly SaaS products, we enforce a limit of 10 failed login attempts before temporarily blocking the account to prevent brute force attacks. We empower our clients to integrate their own Identity Provider (IDP) for authentication, thereby enhancing system security. In cases where clients do not provide an IDP, we offer a username and password login system, ensuring password strength in compliance with the NIST 800-63b standard.
- Access restrictions in management interfaces and support channels
- Promptly adheres to the "principle of the least privilege," ensuring users access only necessary resources for their roles, minimizing unauthorized access and data breaches. Ungranted permissions are prohibited. RBAC (Role-Based Access Control) is the primary method for assigning and maintaining access, with rights allocated primarily to groups for role-specific access. Individual accounts may receive additional permissions with authorized approval. All privileged access to production systems requires Multi-Factor Authentication (MFA).
- Access restriction testing frequency
- At least once a year
- Management access authentication
- 2-factor authentication
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Proks Certification - https://proks.co/en
- ISO/IEC 27001 accreditation date
- 15/09/2023
- What the ISO/IEC 27001 doesn’t cover
-
"We have a group of 19 policies that covers all the iso 27001 topics:
- Information Security Policy
- Risk Assessment and Management
- Access Control
- Physical Security
- Information Security Awareness and Training
- Incident Management and Response
- Business Continuity and Disaster Recovery
- Compliance" - ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
-
- ISO27001
- CE+
- DTAC
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- ISO/IEC 27001
- Other
- Other security governance standards
- CE+
- Information security policies and processes
-
We have a group of 19 policies that covers all the iso 27001 topics:
- Information Security Policy
- Risk Assessment and Management
- Access Control
- Physical Security
- Information Security Awareness and Training
- Incident Management and Response
- Business Continuity and Disaster Recovery
- Compliance
We have an web application that allows to manage all the policies and all the employees needed to agree with them. We have a Governance council responsible to keep track on security needs and provide guidance and information when needed. We have formal meetings that we call management reviews that we use to understand improvement needs and mitigation actions. We give security training every year to our employees as standard.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
The Change Management process ensures all changes are managed methodically—recorded, evaluated, authorized, implemented, and reviewed. The Customer Success Manager oversees this, mitigating project risks. Changes arise from client requests or during phases like system design and testing, needing improvement or error correction. Changes are categorized as:
1. **Standard Changes**: Low-risk, common, pre-authorized.
2. **Normal Changes**: High-priority, requiring thorough evaluation and approval.
3. **Emergency Changes**: Immediate actions for unexpected threats.
The process concludes with a formal sign-off at the contract's end. - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- Vulnerability management process consists of Access review, Risk Assessment, Vulnerability test and Penetration test. Findings out of these assessments are prioritised and addressed. Change, Patch and Asset management processes helps in identifying and mitigating the vulnerabilities and the associated risks. We follow ISO 27001 standard and best practices.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
Promptly employs the AWS recommend services for monitoring, identify and block attacks. AWS WAF on AWS ALB and AWS Cloudfront to control and absorb traffic and deflect unwanted requests.
Amazon Guardyty, a managed service that continuously monitor for malicious or unauthorised behavior is also enabled. It monitors for activity such as unusual API calls or potentially unauthorised deployments that indicate a possible account compromise. GuardDuty also detects potentially compromised instances or reconnaissance by attackers. - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Our management policy: https://proefgroup.sharepoint.com/:b:/r/sites/promptlyhealth/Documentos%20Partilhados/Promptly%20Compliance/ISO%2027001/Policies%20pdf/POL-17%20Incident%20Management.pdf?csf=1&web=1&e=uGzQXi
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
-
- Public Services Network (PSN)
- NHS Network (N3)
- Health and Social Care Network (HSCN)
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
Fighting climate change
Improvement in digital processes ensures the progressive dematerialization of healthcare services. The usage of efficient and automated processes ensures less resource waste.Covid-19 recovery
Standard analytical models are crucial for responding to emerging diseases, like COVID-19. Our services enable clients to be more prepared for seamless collaboration and generating valuable insights.Tackling economic inequality
Increasing interoperability between healthcare providers enables the democratization of access to better and more affordable care. Promoting collaboration while preventing siloing and isolation empowers patients and clinical teams with better research tools.Equal opportunity
At-scale real-world evidence can be useful for reducing bias in clinical studies, increasing equity in treatment efficacy.
Pricing
- Price
- £65,000 a licence
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- Upon request and customized accordingly