Derilinx Ltd.
Open and Shared Data Catalogue
Data sharing between public service bodies, and sharing / opening with the public
Features
- Data Catalogue based on Open CKAN
- Visualisation based on Open Apache Superset
- Extensive Customisation
- Auditing and Inventory Building
- Planning and Strategy
- APIs
- Data Standardisation and Quality
Benefits
- Shared Data
- Open Data
- Better Data
Pricing
£399.99 a unit a month
- Free trial available
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at tenderawards@derilinx.com.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 14
Service ID
6 6 8 9 0 2 1 5 9 3 4 0 2 9 2
Contact
Derilinx Ltd.
Stephen Murray
Telephone: 00353877984808
Email: tenderawards@derilinx.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
- None
- System requirements
- Common user devices
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Hourly within business days
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- We assign a dedicated account manager and technical lead
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Online training and documentation is normally enough as it is an intuitive application
- Service documentation
- Yes
- Documentation formats
-
- HTML
- ODF
- End-of-contract data extraction
- Users can extract via open formats
- End-of-contract process
- Happy to transition platform to client / client appointed supplier hosting and maintenance if required
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Mobile focussed interface with core navigation
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- Description of service interface
- API infrastructure
- Accessibility standards
- WCAG 2.1 AA or EN 301 549
- Accessibility testing
- Extensive testing and compliance
- API
- Yes
- What users can and can't do using the API
-
Get JSON-formatted lists of a site’s datasets, groups or other CKAN objects
Get a full JSON representation of a dataset, resource or other object
Search for packages or resources matching a query
Create, update and delete datasets, resources and other objects
Get an activity stream of recently changed datasets on a site - API documentation
- Yes
- API documentation formats
- Open API (also known as Swagger)
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- We are open to customisation, and sometimes clients co-own the code (python) with us. Some also adopt our code and take in its development and maintenance.
Scaling
- Independence of resources
- We use load management and balancing and have near infinite scaling available.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Portal usage by user behaviour
- Reporting types
- Regular reports
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
-
- Physical access control, complying with SSAE-16 / ISAE 3402
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- Mainly csv via interface. Other forms also available e.g. API
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- XLS
- HTML
- WML
- JSON
- TXT
- RSS
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- XLS
- WML
- JSON
- XML
- TXT
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- Service credits available when SLA levels are not met.
- Approach to resilience
- We use multiple redundant resources so any one failure does not affect service. This can span several cloud providers and network geographies for ultimate resilience
- Outage reporting
- There is a public dashboard and email alerting
Identity and authentication
- User authentication needed
- No
- Access restrictions in management interfaces and support channels
- We can apply multi-level access management for elevated users, including for MFA
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users receive audit information on a regular basis
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
- https://www.linode.com/legal-security/
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- We have a third party security expert who oversees our platform security and reports to the Director independently
- Information security policies and processes
- Tech team all accountable for security to CTO. Security expert is independent of internal lines of reporting and reports directly to the board director on security matters.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- We have full change management process with roll-back if required. There are separate testing and production environments for all our customers.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- We update any threats to a register daily and respond according to the rating of the threat which may require immediate, daily, weekly or monthly roll-up actions.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- We audit for compromise internally daily. We have weekly and monthly checks by an independent third party specialist.
- Incident management type
- Supplier-defined controls
- Incident management approach
-
We have pre-defined event response processes.
Users report incidents via support channels and also have escalation paths to management and board.
We provide full root cause analysis with learnings / actions to every incident
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Climate change is a multi-stakeholder and therefore a data sharing challenge. We have a track record of working with our clients on climate data to ensure everyone is working together to meet shared climate goals and targets.Tackling economic inequality
Economic Inequality is a multi-stakeholder and therefore a data sharing challenge. We have a track record of working with our clients on economic inequality to ensure everyone is working together to meet social and economic goals and targets.Equal opportunity
Equal Opportunities for all is a multi-stakeholder and therefore a data sharing challenge. We have a track record of working with our clients on these challenges to ensure everyone is working together to meet shared equality goals and targets.Wellbeing
Health and wellbeing for all is a multi-stakeholder and therefore a data sharing challenge. We have a track record of working with our clients on these challenges to ensure everyone is working together to meet shared population health goals.
Pricing
- Price
- £399.99 a unit a month
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- Agreed based on client's requirements
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at tenderawards@derilinx.com.
Tell them what format you need. It will help if you say what assistive technology you use.