MI View analytic solutions
The service is provided to allow organisations to rapidly analyse all data whether the data is in structured or unstructured form. Output from the analysis can be displayed in a variety of forms from traditional tabular style to real time updating dashboards and exported to other applications for further processing.
Features
- Real-time reporting
- Data Visualisation
- Powerful fast, simple search capabilities
- Scalability
- Scheduled reporting
- Scheduled updating
Benefits
- Data updated in real-time
- Comprehensive facilities to build world class dashboards
- Very simple but powerful search facilities for an end user
- Scalability, can query in seconds 100's millions of records
- Reports can be automatically scheduled to run whenever required
- Data is automatically updated on whatever frequency is necessary
Pricing
£9,000 a licence a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
6 8 0 3 4 7 1 1 1 4 1 1 3 0 1
Contact
Total Intelligence Ltd (G8)
Chris Finch
Telephone: 07900675811
Email: chris.finch@totalintelligence.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Service constraints
- No constraints other than following the guidelines for configuration
- System requirements
-
- Windows 64 Bit or Linux 64 bit OS
- Sun Java JDK 64 bit 1.9 or above
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Response depends on the SLA. Response times would be different at weekends
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Support is universal, the cost is dependent on numbers of users. A technical account manager is called on if needed.
- Support available to third parties
- No
Onboarding and offboarding
- Getting started
- Users are provided with onsite training AND User documentation
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- All data created/stored by the User can be exported in a number of different formats (e.g. CSV) following the end of a contract.
- End-of-contract process
- We require 3 months notice in writing once a customer decides to end a contract. Unless additional services to assist in offboarding are requested there are no additional costs.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- No
- Customisation available
- Yes
- Description of customisation
- MI View can be 'skinned' to reflect the customer using it to deliver their outputs
Scaling
- Independence of resources
- This is managed by appropriate configuration of the resources
Analytics
- Service usage metrics
- Yes
- Metrics types
- All activity is captured in Log data
- Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra support
- Organisation whose services are being resold
- Connexica
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Users can export their data from MI View in a number of ways (e.g. PDF, Excel, HTML, Image, XML)
- Data export formats
-
- CSV
- ODF
- Other
- Data import formats
-
- CSV
- ODF
- Other
- Other data import formats
-
- Oracle
- DB2
- Postgress SQL
- JDBCOLAP
- Sybase
- SQL Server 2008 & above
- SQL server 2000-2005
- MI VIew (other instances of)
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- Legacy SSL and TLS (under version 1.2)
- Other
- Other protection between networks
- Data transfer can be via SFTP
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
-
This is at two levels. The application availability will depend on the SLA's in place with the application host, normally this is expected to be 99% +.
Availability for the application itself is expected to be 99% +, only downtime is consumed by upgrades to the operating software and the application itself. - Approach to resilience
- Available on request.
- Outage reporting
- E mail alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- In order to access managment interfaces and support channels the user MUST have been assigned the relevant permissions. Standard users will have access to the relevant screens to make amendments to the application configuration. Admin users authenticate onto the system by using user names and passwords as is the case with standard users. MI View has always offerd a high degree of flexibility with passowrd policies that are enforced as well as giving the user the ability to audit log on and log off events. An access process for managment/support channels which ensures only qualified staff can access client instances.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- You control when users can access audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- You control when users can access audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Total Intelligence is responsible for ensuring the service is installed in a secure environment. The data processed within the service is encrypted so is NOT accessible by any other processor/or users outside the aspplication
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- All upgrades and fix releases are managed through the defined change managment process. This ensures clients are already aware of all scheduled application changes and there is an associated design, development, QA and release mechanism in place that shows that changed functionality has been tested and meets the requirements specified prior to production. In addition it is possible to define agreed release schedules so that software changes (unless agreed as a priority fix) are only implemented within specific dates and times to minimise any potential impact on the organisation whilst the implementation is taking place.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- All upgrades and fix releases are managed through the defined change managment process. This ensures clients are already aware of all scheduled application changes and there is an associated design, development, QA and release mechanism in place that shows that changed functionality has been tested and meets the requirements specified prior to production. Systems have been configured for clients to automatically provide notification of issues on the host server regarding CPU/Memory utilisation as well as systems that automate backup processes. Preferred hosting partners identify potential compromises and respond to these threats in accordance with the ISO27001:2014 standard.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- For easch major release an automated vulnerability scan is completed to highlight any known vulnerabilities within the architecture of the application. This focuses on reviewing the application against vulnerabilities highlighted by OWASP. Literature/information from OWASP is reviewed to ensure newly discovered issues are already handled within the application. The dvevelopment team will patch any gaps within 2 weeks. Additionally, penetration tests haver been conducted byexternal security consultants approved by the CREST organisation when major functional changes are made to the aplication.
- Incident management type
- Supplier-defined controls
- Incident management approach
- A significant repository of knowledge has been built which assists in the rectification of frequent and/or known issues as quickly and efficiently as possible. SLA's are defined for different incident classifications dependent on severity and associated business impact. If the issue cannot be dealt with immediately it will be passed onto the development team for resolution. A patch will then be created, tested and made available as a patch release. Users can report incidents therough the online helpdesk portal. Weekly incident reports can also be accessed through this portal.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
- NHS Network (N3)
Social Value
- Social Value
-
Social Value
Equal opportunityEqual opportunity
We have always championed equal opportunities for any existing or potential future employees regardless of age, gender, race or religion.
Pricing
- Price
- £9,000 a licence a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Free trials can be set up to provide users with a limited view of the product and its capabilities providing the user undertakes a short training session