Data Management Services
ACS provide a range of Data platform & Information Lifecycle Management services across a number of technologies including Cloud , On-prem and Hybrid across SQL, NoSQL Enterprise and Opensource. We assist our clients in the public and private sector with hosting, delivery, support, migration, ETL & data over sound solutions.
Features
- Bespoke Data Warehouse Solutions
- Master Data Management strategies and delivery
- Corporate Reporting
- Operational Reports
- Analytics
- Remote Access
- Real-time Reporting
- NoSQL Capabilities
- Data Integration
- Data Architecture
Benefits
- Data Consistency across environments
- Data Accuracy can be measured
- Single version of Truth through Master data management
- Data Documentation/Artefacts can be produced
- Data Security throughout processing and support phases
- AGILE methodology adopted with Client acceptance stages
- 24:7:365 support desk to manage any issues
Pricing
£30.00 to £50.00 a unit an hour
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
6 2 2 1 4 7 4 9 5 0 3 1 9 1 0
Contact
ANYA CONSULTANCY SERVICES LIMITED
Balaji Perumal
Telephone: +44 7841096318
Email: balajip@anyaconsultancy.com
Service scope
- Service constraints
-
When ACS delivers a data management service it is always delivered in a way that the ongoing maintenance of that data service is documented; is as automated as possible; and that aligns with the other client systems management processes. As such we will agree a support and maintenance contract with the client as part of the engagement including frequency and times when maintenance will be performed alongside daily database housekeeping activities.
ACS will always strive to arrange scheduled maintenance to be outside the normal working hours of the client. - System requirements
- No specific requirements except licences for the technology being managed
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- SLA P1: Informing customer are 100% within 30 minutes 99% fix within 5 hours Update to client every 2 hours P2: Informing customer are 100% within 60 minutes 99% fix within 8 hours Update to client daily P3: Informing customer are 100% within 4 hours 99% fix within 12 hours P4: Informing customer are 100% within 8 hours 99% fix within 24 hours Service reports are standard and a technical account manager is assigned for every client. ACS offers the above as its standard support package with a defined cost. (Based on a working day)
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AAA
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- WCAG 2.1 AAA
- Web chat accessibility testing
- Web chat testing has undergone User Acceptance Testing by some of our clients. In addition we use Lighthouse to assess the conformance to Accessibility standards.
- Onsite support
- Yes, at extra cost
- Support levels
-
The following is the typical support level as part of our support contracts ACS defines 4 levels of incident.
Priority 1 incident: Urgent (Critical Impact)
Priority 2 incident: High (Significant impact)
Priority 3 incident: Normal (Minor Impact)
Priority 4 incident: Low (Informational)
SLA
P1: Informing customer are 100% within 30 minutes
99% fix within 5 hours
Update to client every 2 hours
P2: Informing customer are 100% within 60 minutes
99% fix within 8 hours
Update to client daily
P3: Informing customer are 100% within 4 hours
99% fix within 12 hours
P4: Informing customer are 100% within 8 hours
99% fix within 24 hours
Service reports are standard and a technical account manager is assigned for every client.
ACS offers the above as its standard support package with a defined cost. Changes to this framework would be discussed and costed as bespoke requirements with the client. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
When ACS has completed the specific data management service for the client there is stage of handing over to the client so that they can embed into their operating model and we call this Service Introduction.
ACS encourages and supports Service Introduction activities and these include knowledge transfer (training) by role, knowledge transfer (training) by function and support model transition documentation such as diagnostic guides.
Typically ACS will record any training and deliver ppts so that the client can refer back to any material at any time. - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- There is a range of services that can be supplied at the end of a contract depending on the complexity of the application and its data schema. Typically our Database Administrators would need to support extract into a format specified by the client for potentially migrating to a new system. There may be some need to handle historic data differently to currently active data ie extracting separately and migrating to archive. ACS has extensive experience of assisting customers to migrate data from and to different systems.
- End-of-contract process
-
At the end of a contract and if a customer does not want to continue the engagement then ACS can supply services to support migration to a new system. This is usually at additional cost as a migration activity is complex.
Data would be destructed according to client policy and a Data destruction note created. This would be chargeable according to the source database, the technologies involved, where the data is to be migrated to.
Using the service
- Web browser interface
- No
- API
- No
- Command line interface
- No
Scaling
- Scaling available
- Yes
- Scaling type
- Automatic
- Independence of resources
-
ACS maintains portfolio management based on the Managing Successful Programmes methodology, this includes capacity management.
The portfolio is reviewed weekly and resources allocated accordingly to manage demand.
ACS does not co-host services and machine/database resource conflict is not an issue - Usage notifications
- Yes
- Usage reporting
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- HTTP request and response status
- Memory
- Number of active instances
- Reporting types
- Regular reports
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- European Economic Area (EEA)
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Deleted data can’t be directly accessed
- Hardware containing data is completely destroyed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- ACS will always enable backup of the application software
- ACS will always enable backup of the application database
- ACS will always enable backup of the application logs
- ACS will always enable backup of the database logs
- ACS will always enable backup of the profiles and configuration
- Backup controls
- ACS adds monitoring to its solutions and provides reports.
- Datacentre setup
- Multiple datacentres with disaster recovery
- Scheduling backups
- Supplier controls the whole backup schedule
- Backup recovery
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- ACS agrees SLAs with its clients for every service it delivers. Maintenance slots (scheduled outage with a schedule of dates) will be agreed to perform activities such as patch upgrades. The Availability SLA will be subject to considering the clients core business hours. Failures to meet 100% availability will be assessed through root cause analysis. Typically we work to 99% availability during core hours.
- Approach to resilience
-
All ACS projects begin with an architecture that complies with our catalogue of non-functional requirements. ACS will guide the client on how to make the database and it its services resilient at this stage. Resilience comes at cost e.g. additional standby databases. ACS will work with the client on an environment by environment basis to determine how resilient the environment needs to be to perform its function and meet a realistic SLA, and then provide architecture that is a sensible balance of those factors.
The client team has opportunity during the early stages of the project to review and assure the architecture.
The architecture will then be built and thereafter non-functional testing will occur and resilience testing is included during this phase.
The availability SLA will be created for each environment to be supported based on its architecture. - Outage reporting
-
Every client has their own Systems Management framework that every system integrates with, and in the more sophisticated organisations these may automatically alert into the ticketing system. We recognise that every organisation is different, and our key principle is that as part of service introduction we will integrate any alerts into that framework if it exists.
Failing that we would raise an incident on our Help Desk and would contact the client via SMS & email according to the priority of the issue.
Identity and authentication
- User authentication
- 2-factor authentication
- Access restrictions in management interfaces and support channels
- The proposed solution provides complete integrated rich interface for Joiners Movers Leavers process. Our cloud solution provides flexibility for integrating with Active Directory or any LDAP based solutions. Our solution provides integration with SAML 2.0 and OAUTH compatible identity solutions.
- Access restriction testing frequency
- Less than once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Devices users manage the service through
- Dedicated device on a segregated network (providers own provision)
Audit information for users
- Access to user activity audit information
- Users receive audit information on a regular basis
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users receive audit information on a regular basis
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Bsi
- ISO/IEC 27001 accreditation date
- 31/01/2024
- What the ISO/IEC 27001 doesn’t cover
- Our certificate / scope does not include the drone arm of the organisation. We are currently rolling out policies and processes for Drones with a view to extending ISO scope. That will not affect this service.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
ACS has an information security policy, and data protection policy that is approved by the CISO. The policy is restricted to internal use only and some elements form part of our employee contracts . System changes or new client requirements are assessed against the policies. Roles and privileges are assessed against the policy. Maintenance of systems and monitoring of systems is performed according to policy. The policy is reviewed at least annually or if there are any new challenging threats . Our Quality management system defines ACS processes and standards and supports the implementation of the policy. There is a separate Data Protection policy and with every project we perform a data protection impact assessment (DPIA) to ensure that data is classified to be processed according to policy.
The Executive team meet every month and follow a fixed agenda including policy review/change.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
ACS develops all its products using specialist tools for change and configuration management and uses a process based on ITIL CCM standards. Where necessary we will adapt our process to those of the client and integrate our tools to theirs.
For databases we are particularly on top of version controlling stored procedures. Every software components is version controlled from cradle to grave, and deployment of component versions tracked.
All RFC (Request for change) are impact assessed by technical teams at CAB (Change Board) to ensure best practice and no regression of existing systems. - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- When we are made aware of potential threats, ACS applies fixes and patches after assessment of risk, and will create an RFC (request for change) or emergency RFC according to risk. The Level of Risk influences the speed to deployment. Ideally changes happen in the agreed maintenance slot, but this cannot always happen, and we work with the clients processes to raise an emergency RFC and agree the change timeslot with their Change Board. Proactively, ACS has a well defined architecture to its solutions and we look at supplier websites/receive alerts among other sources to determine new threats.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- When we are made aware of potential threats, ACS applies fixes and patches after assessment of risk, and will create an RFC (request for change) or emergency RFC according to risk. The Level of Risk influences the speed to deployment. Ideally changes happen in the agreed maintenance slot, but this cannot always happen, and we work with the clients processes to raise an emergency RFC and agree the change timeslot with their Change Board. Proactively, ACS has a well defined architecture to its solutions and we look at supplier websites/receive alerts among other sources to determine new threats.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
ACS has an incident and problem management processes based on ITIL. There is also a service management tool to record these and where users can report incidents through our portal.
Scripts are created for common incidents so that any member of the support team can respond consistently to our clients . Incident reports are produced on the system and shared at service reviews with our client.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Supplier
- Virtualisation technologies used
- Hyper-V
- How shared infrastructure is kept separate
- Our virtualization approach is predefined scripts which can be supported on Hyper-V and also other virtualization techniques.
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
- Azure and AQWS datacentres host our solutions typically
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
ACS creates a number of products that have fighting climate change at the heart.
Our Athena product that is used in domains such as hospitals, prisons, and schools manages the food lifecycle. This has a positive impact on climate change including modules such as reducing food waste, and implicitly reducing energy to create meals.
We also supply drones to Agri-tech suppliers for projects that monitor crop production.
As an organisation our efforts are focused on reducing waste and energy across all activities undertaken by the business. On the floor, we encourage sustainable utensils and cups including personalized glass bottles and ceramic crockery for coffee and lunch.
The organization strongly discourage disposable plastic utensils using 100% bio-degradable products.
We keep thermostats at the optimum level to control the financial and environmental costs.
Staff are encouraged to use shared and public transportation wherever possible to control the financial and environmental costsCovid-19 recovery
ACS recognises that the UK Economy is undergoing a recovery strategy after the severe impacts of Covid-19. As an organisation we have engaged with Innovate UK, and started an international expansion with our first major client in Saudi Arabia. We are also looking at other innovative products and partnerships that we believe will boost the UK economy.Tackling economic inequality
ACS is committed to working with the communities in UK in education, livelihood and inclusion. Our organisational value culture is aligned with giving back to our communities.
We have partnered with charities like Talk Back to help our local community building a skill development and knowledge transfer.
To support our plan to lead such initiatives we have created our entrepreneurship programme Innovation Camp Unit and our Apprentices training and development programme where we have already associated with number of universities for their internship or apprenticeship programmes for building new skills. This is part of our broader commitment to creating entry level opportunities in the technology and digital sectors for those facing greater barriers to entry.Equal opportunity
As a global organization operating in 4 countries ACS has a fair and progressive employer reputation. ACS is commited to and complying with fair work policies wherever our staff reside.
ACS has adopted a continuous feedback approach to performance management where both managers and staff can meet regularly to discuss career aspirations, training and development needs and review goals and objectives which are aligned to our core values, team and business goals.
To achieve the above, ACS will:
- Adopt a continuous performance management process where teams receive regular feedback and coaching from their managers.
- Encourage and promote staff training, career development and succession planning.
- Create a culture of open recognition by celebrating achievements and success in line with the company core values.
The policy for the same applies to all officers, directors, employees.
ACS’s overall aim is to create a high-performance culture to maximise individual and team performance and reinforce the company’s values and behaviours which are the driving force behind everything we do.
A high-performance culture focuses on growth and development, as well as encouraging teams to achieve their best work and feel empowered.
ACS is committed to supporting every individual to reach their full potential and achieve their professional goals.Wellbeing
ACS lays great emphasis on the quality of its people. We believe each of our professionals is unique and can contribute significantly and creatively.
The one thing that makes ACS so successful is the people we employ and we need excellent staff. In return, we do our best to be supportive and ensure that staff wellbeing and job satisfaction is our top priority. ACS ensures that the demands of your job are reasonable, and you are adequately trained and supported to undertake your role and deliver the services on behalf of ACS customers.
A big benefit of having global teams is that we'll get the opportunity to learn about, and respect other people's cultures learn from diverse perspectives, cultures, and backgrounds, which can enrich our professional and personal growth.
As part of our effort to improve our staff abilities to manage stress, we promote Yoga sessions at the office. Yoga develop attention, and embody confidence. All of these factors can contribute to increased productivity, a more pleasant atmosphere at work, and an overall improved feeling of morale in the workplace
Pricing
- Price
- £30.00 to £50.00 a unit an hour
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- The trail service includes access to software and data environments. High level design of the solution, integration contracts, User interface and business rules validation agreed between the organization.