Skip to main content

Help us improve the Digital Marketplace - send your feedback

ANYA CONSULTANCY SERVICES LIMITED

Data Management Services

ACS provide a range of Data platform & Information Lifecycle Management services across a number of technologies including Cloud , On-prem and Hybrid across SQL, NoSQL Enterprise and Opensource. We assist our clients in the public and private sector with hosting, delivery, support, migration, ETL & data over sound solutions.

Features

  • Bespoke Data Warehouse Solutions
  • Master Data Management strategies and delivery
  • Corporate Reporting
  • Operational Reports
  • Analytics
  • Remote Access
  • Real-time Reporting
  • NoSQL Capabilities
  • Data Integration
  • Data Architecture

Benefits

  • Data Consistency across environments
  • Data Accuracy can be measured
  • Single version of Truth through Master data management
  • Data Documentation/Artefacts can be produced
  • Data Security throughout processing and support phases
  • AGILE methodology adopted with Client acceptance stages
  • 24:7:365 support desk to manage any issues

Pricing

£30.00 to £50.00 a unit an hour

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at balajip@anyaconsultancy.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

6 2 2 1 4 7 4 9 5 0 3 1 9 1 0

Contact

ANYA CONSULTANCY SERVICES LIMITED Balaji Perumal
Telephone: +44 7841096318
Email: balajip@anyaconsultancy.com

Service scope

Service constraints
When ACS delivers a data management service it is always delivered in a way that the ongoing maintenance of that data service is documented; is as automated as possible; and that aligns with the other client systems management processes. As such we will agree a support and maintenance contract with the client as part of the engagement including frequency and times when maintenance will be performed alongside daily database housekeeping activities.
ACS will always strive to arrange scheduled maintenance to be outside the normal working hours of the client.
System requirements
No specific requirements except licences for the technology being managed

User support

Email or online ticketing support
Email or online ticketing
Support response times
SLA P1: Informing customer are 100% within 30 minutes 99% fix within 5 hours Update to client every 2 hours P2: Informing customer are 100% within 60 minutes 99% fix within 8 hours Update to client daily P3: Informing customer are 100% within 4 hours 99% fix within 12 hours P4: Informing customer are 100% within 8 hours 99% fix within 24 hours Service reports are standard and a technical account manager is assigned for every client. ACS offers the above as its standard support package with a defined cost. (Based on a working day)
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AAA
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
Web chat
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
WCAG 2.1 AAA
Web chat accessibility testing
Web chat testing has undergone User Acceptance Testing by some of our clients. In addition we use Lighthouse to assess the conformance to Accessibility standards.
Onsite support
Yes, at extra cost
Support levels
The following is the typical support level as part of our support contracts ACS defines 4 levels of incident.
Priority 1 incident: Urgent (Critical Impact)
Priority 2 incident: High (Significant impact)
Priority 3 incident: Normal (Minor Impact)
Priority 4 incident: Low (Informational)

SLA
P1: Informing customer are 100% within 30 minutes
99% fix within 5 hours
Update to client every 2 hours

P2: Informing customer are 100% within 60 minutes
99% fix within 8 hours
Update to client daily

P3: Informing customer are 100% within 4 hours
99% fix within 12 hours

P4: Informing customer are 100% within 8 hours
99% fix within 24 hours

Service reports are standard and a technical account manager is assigned for every client.
ACS offers the above as its standard support package with a defined cost. Changes to this framework would be discussed and costed as bespoke requirements with the client.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
When ACS has completed the specific data management service for the client there is stage of handing over to the client so that they can embed into their operating model and we call this Service Introduction.
ACS encourages and supports Service Introduction activities and these include knowledge transfer (training) by role, knowledge transfer (training) by function and support model transition documentation such as diagnostic guides.
Typically ACS will record any training and deliver ppts so that the client can refer back to any material at any time.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
There is a range of services that can be supplied at the end of a contract depending on the complexity of the application and its data schema. Typically our Database Administrators would need to support extract into a format specified by the client for potentially migrating to a new system. There may be some need to handle historic data differently to currently active data ie extracting separately and migrating to archive. ACS has extensive experience of assisting customers to migrate data from and to different systems.
End-of-contract process
At the end of a contract and if a customer does not want to continue the engagement then ACS can supply services to support migration to a new system. This is usually at additional cost as a migration activity is complex.
Data would be destructed according to client policy and a Data destruction note created. This would be chargeable according to the source database, the technologies involved, where the data is to be migrated to.

Using the service

Web browser interface
No
API
No
Command line interface
No

Scaling

Scaling available
Yes
Scaling type
Automatic
Independence of resources
ACS maintains portfolio management based on the Managing Successful Programmes methodology, this includes capacity management.
The portfolio is reviewed weekly and resources allocated accordingly to manage demand.
ACS does not co-host services and machine/database resource conflict is not an issue
Usage notifications
Yes
Usage reporting
Email

Analytics

Infrastructure or application metrics
Yes
Metrics types
  • CPU
  • Disk
  • HTTP request and response status
  • Memory
  • Number of active instances
Reporting types
Regular reports

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
European Economic Area (EEA)
User control over data storage and processing locations
No
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Yes
Data sanitisation type
  • Deleted data can’t be directly accessed
  • Hardware containing data is completely destroyed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Backup and recovery

Backup and recovery
Yes
What’s backed up
  • ACS will always enable backup of the application software
  • ACS will always enable backup of the application database
  • ACS will always enable backup of the application logs
  • ACS will always enable backup of the database logs
  • ACS will always enable backup of the profiles and configuration
Backup controls
ACS adds monitoring to its solutions and provides reports.
Datacentre setup
Multiple datacentres with disaster recovery
Scheduling backups
Supplier controls the whole backup schedule
Backup recovery
Users contact the support team

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
ACS agrees SLAs with its clients for every service it delivers. Maintenance slots (scheduled outage with a schedule of dates) will be agreed to perform activities such as patch upgrades. The Availability SLA will be subject to considering the clients core business hours. Failures to meet 100% availability will be assessed through root cause analysis. Typically we work to 99% availability during core hours.
Approach to resilience
All ACS projects begin with an architecture that complies with our catalogue of non-functional requirements. ACS will guide the client on how to make the database and it its services resilient at this stage. Resilience comes at cost e.g. additional standby databases. ACS will work with the client on an environment by environment basis to determine how resilient the environment needs to be to perform its function and meet a realistic SLA, and then provide architecture that is a sensible balance of those factors.
The client team has opportunity during the early stages of the project to review and assure the architecture.

The architecture will then be built and thereafter non-functional testing will occur and resilience testing is included during this phase.
The availability SLA will be created for each environment to be supported based on its architecture.
Outage reporting
Every client has their own Systems Management framework that every system integrates with, and in the more sophisticated organisations these may automatically alert into the ticketing system. We recognise that every organisation is different, and our key principle is that as part of service introduction we will integrate any alerts into that framework if it exists.
Failing that we would raise an incident on our Help Desk and would contact the client via SMS & email according to the priority of the issue.

Identity and authentication

User authentication
2-factor authentication
Access restrictions in management interfaces and support channels
The proposed solution provides complete integrated rich interface for Joiners Movers Leavers process. Our cloud solution provides flexibility for integrating with Active Directory or any LDAP based solutions. Our solution provides integration with SAML 2.0 and OAUTH compatible identity solutions.
Access restriction testing frequency
Less than once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
Devices users manage the service through
Dedicated device on a segregated network (providers own provision)

Audit information for users

Access to user activity audit information
Users receive audit information on a regular basis
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users receive audit information on a regular basis
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
Bsi
ISO/IEC 27001 accreditation date
31/01/2024
What the ISO/IEC 27001 doesn’t cover
Our certificate / scope does not include the drone arm of the organisation. We are currently rolling out policies and processes for Drones with a view to extending ISO scope. That will not affect this service.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
ACS has an information security policy, and data protection policy that is approved by the CISO. The policy is restricted to internal use only and some elements form part of our employee contracts . System changes or new client requirements are assessed against the policies. Roles and privileges are assessed against the policy. Maintenance of systems and monitoring of systems is performed according to policy. The policy is reviewed at least annually or if there are any new challenging threats . Our Quality management system defines ACS processes and standards and supports the implementation of the policy. There is a separate Data Protection policy and with every project we perform a data protection impact assessment (DPIA) to ensure that data is classified to be processed according to policy.
The Executive team meet every month and follow a fixed agenda including policy review/change.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
ACS develops all its products using specialist tools for change and configuration management and uses a process based on ITIL CCM standards. Where necessary we will adapt our process to those of the client and integrate our tools to theirs.
For databases we are particularly on top of version controlling stored procedures. Every software components is version controlled from cradle to grave, and deployment of component versions tracked.
All RFC (Request for change) are impact assessed by technical teams at CAB (Change Board) to ensure best practice and no regression of existing systems.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
When we are made aware of potential threats, ACS applies fixes and patches after assessment of risk, and will create an RFC (request for change) or emergency RFC according to risk. The Level of Risk influences the speed to deployment. Ideally changes happen in the agreed maintenance slot, but this cannot always happen, and we work with the clients processes to raise an emergency RFC and agree the change timeslot with their Change Board. Proactively, ACS has a well defined architecture to its solutions and we look at supplier websites/receive alerts among other sources to determine new threats.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
When we are made aware of potential threats, ACS applies fixes and patches after assessment of risk, and will create an RFC (request for change) or emergency RFC according to risk. The Level of Risk influences the speed to deployment. Ideally changes happen in the agreed maintenance slot, but this cannot always happen, and we work with the clients processes to raise an emergency RFC and agree the change timeslot with their Change Board. Proactively, ACS has a well defined architecture to its solutions and we look at supplier websites/receive alerts among other sources to determine new threats.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
ACS has an incident and problem management processes based on ITIL. There is also a service management tool to record these and where users can report incidents through our portal.
Scripts are created for common incidents so that any member of the support team can respond consistently to our clients . Incident reports are produced on the system and shared at service reviews with our client.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
Yes
Who implements virtualisation
Supplier
Virtualisation technologies used
Hyper-V
How shared infrastructure is kept separate
Our virtualization approach is predefined scripts which can be supported on Hyper-V and also other virtualization techniques.

Energy efficiency

Energy-efficient datacentres
Yes
Description of energy efficient datacentres
Azure and AQWS datacentres host our solutions typically

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

ACS creates a number of products that have fighting climate change at the heart.
Our Athena product that is used in domains such as hospitals, prisons, and schools manages the food lifecycle. This has a positive impact on climate change including modules such as reducing food waste, and implicitly reducing energy to create meals.
We also supply drones to Agri-tech suppliers for projects that monitor crop production.

As an organisation our efforts are focused on reducing waste and energy across all activities undertaken by the business. On the floor, we encourage sustainable utensils and cups including personalized glass bottles and ceramic crockery for coffee and lunch.
The organization strongly discourage disposable plastic utensils using 100% bio-degradable products.
We keep thermostats at the optimum level to control the financial and environmental costs.
Staff are encouraged to use shared and public transportation wherever possible to control the financial and environmental costs

Covid-19 recovery

ACS recognises that the UK Economy is undergoing a recovery strategy after the severe impacts of Covid-19. As an organisation we have engaged with Innovate UK, and started an international expansion with our first major client in Saudi Arabia. We are also looking at other innovative products and partnerships that we believe will boost the UK economy.

Tackling economic inequality

ACS is committed to working with the communities in UK in education, livelihood and inclusion. Our organisational value culture is aligned with giving back to our communities.
We have partnered with charities like Talk Back to help our local community building a skill development and knowledge transfer.
To support our plan to lead such initiatives we have created our entrepreneurship programme Innovation Camp Unit and our Apprentices training and development programme where we have already associated with number of universities for their internship or apprenticeship programmes for building new skills. This is part of our broader commitment to creating entry level opportunities in the technology and digital sectors for those facing greater barriers to entry.

Equal opportunity

As a global organization operating in 4 countries ACS has a fair and progressive employer reputation. ACS is commited to and complying with fair work policies wherever our staff reside.
ACS has adopted a continuous feedback approach to performance management where both managers and staff can meet regularly to discuss career aspirations, training and development needs and review goals and objectives which are aligned to our core values, team and business goals.
To achieve the above, ACS will:
- Adopt a continuous performance management process where teams receive regular feedback and coaching from their managers.
- Encourage and promote staff training, career development and succession planning.
- Create a culture of open recognition by celebrating achievements and success in line with the company core values.
The policy for the same applies to all officers, directors, employees.
ACS’s overall aim is to create a high-performance culture to maximise individual and team performance and reinforce the company’s values and behaviours which are the driving force behind everything we do.
A high-performance culture focuses on growth and development, as well as encouraging teams to achieve their best work and feel empowered.
ACS is committed to supporting every individual to reach their full potential and achieve their professional goals.

Wellbeing

ACS lays great emphasis on the quality of its people. We believe each of our professionals is unique and can contribute significantly and creatively.
The one thing that makes ACS so successful is the people we employ and we need excellent staff. In return, we do our best to be supportive and ensure that staff wellbeing and job satisfaction is our top priority. ACS ensures that the demands of your job are reasonable, and you are adequately trained and supported to undertake your role and deliver the services on behalf of ACS customers.
A big benefit of having global teams is that we'll get the opportunity to learn about, and respect other people's cultures learn from diverse perspectives, cultures, and backgrounds, which can enrich our professional and personal growth.
As part of our effort to improve our staff abilities to manage stress, we promote Yoga sessions at the office. Yoga develop attention, and embody confidence. All of these factors can contribute to increased productivity, a more pleasant atmosphere at work, and an overall improved feeling of morale in the workplace

Pricing

Price
£30.00 to £50.00 a unit an hour
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
The trail service includes access to software and data environments. High level design of the solution, integration contracts, User interface and business rules validation agreed between the organization.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at balajip@anyaconsultancy.com. Tell them what format you need. It will help if you say what assistive technology you use.