Skip to main content

Help us improve the Digital Marketplace - send your feedback

Juniper Education Services Limited

Sisra Analytics

Sisra Analytics offers a web-based platform for analysing pupil data across KS3, KS4, and KS5. Delivering comprehensive reports on student performance, attainment, and assessment results, providing valuable insights into educational data. Schools can benchmark against national standards to gauge performance. Seamlessly integrating data, it facilitates informed, data-driven decisions enhancing outcomes.

Features

  • Comprehensive reporting across key stages 3, 4 and 5
  • Analyse whole school, subject and pupil performance
  • Powerful comparisons with national data
  • Trust level integration of data
  • Unique data collaboration gives powerful insights into subject progress
  • Analysis includes exam results, assessment data, target data and more
  • Remote access

Benefits

  • Simple to setup and administer
  • Live support via online chat with educational experts
  • Onboarding package to suit your school’s experience and budget
  • Training courses for your staff to best utilise Sisra Analytics
  • Responsive and personalised support on Results Day

Pricing

£1,111.00 a licence

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tenders@junipereducation.org. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

7 1 3 8 4 3 4 9 9 9 0 2 8 0 3

Contact

Juniper Education Services Limited Aimee Hardy
Telephone: 03452008600
Email: tenders@junipereducation.org

Service scope

Software add-on or extension
No
Cloud deployment model
Private cloud
Service constraints
No constraints that buyers should know about
System requirements
None

User support

Email or online ticketing support
Email or online ticketing
Support response times
Service Level Agreements (SLAs) vary from 1 hour to 4 weeks, contingent upon query priority, ranging from High Priority to Low. P1 issues, necessitating immediate attention, demand a swift resolution within an hour, ensuring critical operations aren't disrupted. In contrast, lower priority concerns categorised as Low may allow for a more lenient timeframe of up to 4 weeks for resolution, accommodating less urgent matters without compromising service quality. This tiered approach enables efficient resource allocation and timely response according to the criticality of each query, optimising operational efficiency and customer satisfaction.
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
WCAG 2.1 AA or EN 301 549
Web chat accessibility testing
We use a 3rd party web chat provider
Onsite support
Yes, at extra cost
Support levels
At the heart of our service lies a commitment to empowering your success through a comprehensive support infrastructure. Our 1st line support, handles everyday queries and basic troubleshooting through our accessible Online Knowledge Base. Users find instant solutions and guidance, ensuring seamless operations.

Dedicated agents provide personalised assistance, guiding users through queries and deeper troubleshooting. 2nd line support is available for more complex technical challenges. This tier, accessible through escalation, ensures that even the most intricate issues are addressed efficiently, maintaining high standards and support quality.

Our support levels are bundled into our service packages, ensuring that every user receives the assistance they need without additional charges. Whether you opt for our basic package or a premium one, you'll have access to our comprehensive support infrastructure. We also provide options for additional on-demand support services.

Our support team comprises skilled cloud support engineers who are well-equipped to handle technical queries and challenges promptly and effectively. They are committed to resolving issues swiftly and ensuring your operations run smoothly. With our tiered support system, you can be confident that your concerns will be met with dedication and proficiency, maximising the value of our solutions for your school/s.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Upon purchasing Sisra Analytics, we prioritise a seamless onboarding journey to unlock its full potential. Our dedicated Customer Success Managers (CSMs) serve as personalised guides, closely collaborating with customers to understand their unique goals. They offer expert advice and support tailored to individual needs, ensuring optimal utilisation of the product.

Customers also benefit from our extensive knowledge base, accessible through Help Articles. These resources provide comprehensive guidance, including step-by-step instructions and troubleshooting tips, to address common queries and challenges effectively.

For those seeking structured learning, we provide both standard and bespoke online training programs. Our standard modules offer foundational insights into product features, while bespoke training allows customisation to meet specific needs, ensuring relevance and practical application. We’re committed to delivering a tailored onboarding experience that empowers customers to succeed from day one.
Service documentation
No
End-of-contract data extraction
When a contract concludes, users can effortlessly extract their data from our system in .csv format, providing them with utmost flexibility. Although reports are exportable, it's important to recognise that Sisra Analytics draws data directly from a school's primary Management Information System (MIS). Consequently, the need for exporting data is often obviated, as it remains readily accessible within the MIS itself.

However, should users still desire to retain their data externally, they can easily export it in .csv format, ensuring compatibility with various other systems and software. This process enables users to maintain continuity in their data management practices even after their engagement with our service concludes. Our commitment to seamless data exportation ensures that users retain control over their information and can transition smoothly to alternative platforms or storage solutions as needed.
End-of-contract process
At the end of the contract, our service is temporarily suspended for all users, ensuring compliance with the terms of the agreement. Users can rest assured that their data remains securely stored within our system for a period of one year following the contract expiration,allowing ample opportunity to retrieve any necessary data or information they may require for continuity or reference purposes.

During this period, the license fee covers full access to the service, meaning users won't encounter any additional usage costs. This ensures that schools can access their data as needed without any unexpected expenses.

Furthermore, for those seeking additional support or guidance, optional training and consultancy services are available at an extra cost. These services can be tailored to specific requirements, offering schools the opportunity to further enhance their usage of our platform or address any particular needs they may have.

Our approach at the end of the contract prioritises data security, user accessibility, and optional support services, ensuring a smooth transition for schools while providing them with the flexibility to tailor their experience according to their preferences and requirements.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
All web based products from Juniper Education are built using responsive design principals. The only difference between the web versions and mobile versions is adaptation of the presentation to a smaller screen size. All features and capabilities are therefore the same across platforms.
Service interface
No
User support accessibility
None or don’t know
API
No
Customisation available
Yes
Description of customisation
Users can customise our service to fit their specific needs and workflows. Various aspects can be tailored, including grade methods such as percentages or mastery pathways, and grade types like predictions, current/working at grades, estimates, and targets. Users can adjust baselines using KS2 Scaled Scores, internal baselines, CATs, or MidYIS assessments.

Customisation extends to student filters, allowing users to refine data based on specific criteria, and the display of student context data and statuses. Users can create bespoke focus groups and Expected Attainment Pathways (EAPs) to track and monitor student progress against expectations.

Administrators can configure global settings, encompassing all customisation options listed. This includes setting up user groups for specific staff access, defining data collection names, and organising faculties for departmental analysis. They can also manage trackers and flightpaths, generating them based on specific criteria, and employ Sisra Basic Projections (SBP) to offer early progress indicators.

Users can personalise their reports' homepage by adding shortcuts to classes and adjusting all filters. Administrators can facilitate this customisation universally, ensuring all users have access to and can view the tailored reports. With such flexibility, users can mould our service precisely to their requirements, enhancing efficiency and utility across their educational endeavours.

Scaling

Independence of resources
Sisra Analytics features a robust infrastructure and advanced load-balancing techniques, ensuring consistent performance backed by 24/7 monitoring. Its efficient server management and scalable architecture dynamically allocate resources, preventing any single user or group from monopolising them. Proactive monitoring detects demand fluctuations, automatically adjusting resource allocation for optimal performance.
Continuous optimisation and redundancy measures further safeguard against downtime, ensuring seamless user experiences even during peak periods. Additionally, for anticipated spikes in traffic, such as on GCSE Results Day, we meticulously plan and scale our systems in advance to handle increased traffic efficiently.

Analytics

Service usage metrics
No

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
Other
Other data at rest protection approach
We ensure data protection at rest by encrypting disks attached to virtual machines at the disk level. This encryption secures the data stored on these disks, adding an extra layer of defense against unauthorised access. By encrypting the disks, we mitigate the risk of data breaches or theft, maintaining the confidentiality and integrity of the information even when it's not actively being accessed or transmitted. This robust security measure aligns with industry best practices and standards, providing users with peace of mind regarding the safety of their data within our system.
Data sanitisation process
No
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Data uploaded to the service can be exported via CSV files.
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
In the event of service interruption, our commitment is to swiftly minimise impact. Our dedicated team promptly address any issues and work to restore normal service, ensuring minimal disruption to operations. Throughout the resolution process, transparent communication remains paramount. We provide regular updates on our efforts and status of actions taken to address the underlying cause, keeping you informed every step of the way.

Urgent (P1) : Complete system failure. system wide inability to perform any key activities, i.e. send messages, take a register, access the system, complete payroll. Response 1hr, Resolution 8hrs

High: A key system is not functioning, causing high impact to the operating system. There is no work around or manual process. All users unable to run a key report, problem in key area is time sensitive statutory returns, payroll run. Response 4hrs, Resolution 5 days.

Normal: An issue that impacts noncritical activities but is time critical the issue can be resolved by a workaround or manual process. Unable to run a report, calculation discrepancy, unexpected behaviour of an area of the system. Response 8hrs, Resolution 4weeks.

Low: An issue that has low impact and has a suitable workaround available. It is not time critical. Response 8hrs.
Approach to resilience
This information is available upon request
Outage reporting
Downtime incidents are promptly communicated through in-product messaging, ensuring immediate awareness. For thorough tracking and resolution, Zen Desk tickets are meticulously created and shared with the customer, facilitating accurate tracking for both Juniper support and the customer's records.
Our service has a robust system in place for reporting and managing outages to ensure minimal disruption for our customers. When an outage is expected or occurs, it is immediately reported via an email alert to both our support and infrastructure teams. This initial notification triggers a verification process confirming the nature and extent of the issue. Once verified, we communicate promptly with our customers about the outage. This communication varies depending on the situation but typically includes updates on our dedicated status page, which provides real-time information and progress reports. In addition to updates on the status page, we contact customers directly via email. This ensures all affected parties are informed and can prepare accordingly. Our approach is to maintain transparency and provide regular updates until the issue is fully resolved, ensuring our customers are well-informed and can manage their activities with minimal disruption.
Updates to Sisra Analytics are generally released outside of business hours and do not affect system availability.

Identity and authentication

User authentication needed
Yes
User authentication
Username or password
Access restrictions in management interfaces and support channels
Support within Sisra Analytics is exclusively accessible to system administrators while logged into the service. Our system employs industry-standard Microsoft ASP.NET based security protocols to ensure secure user access to the Sisra solution. Additionally, if necessary, user access can be revoked by Juniper Support to maintain security standards. If a customer discontinues the use of the solution, user access is promptly revoked by Juniper support to uphold data integrity and security measures robustly.
Access restriction testing frequency
At least once a year
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
Juniper Education, adopts a proactive approach to remediation. It begins with a thorough assessment of existing protocols and vulnerabilities, identifying gaps and areas for improvement. Swift action follows, with the establishment of tailored security measures aligned with industry best practices. Robust policies and procedures are implemented, bolstering defences and mitigating risks effectively. Continuous monitoring and audits ensure ongoing compliance and readiness to adapt to evolving threats. By prioritising security as a foundational element, Juniper Education fosters a culture of resilience, safeguarding sensitive data and maintaining trust among stakeholders.
Information security policies and processes
At Juniper, cybersecurity oversight is led by a board-level member dedicated to ensuring the security, resilience, and reliability of our products, data, and services. This executive collaborates closely with Juniper's internal IT, software engineering teams, and the Data Protection officer to enforce daily adherence to established processes. These processes include subjecting all code changes to thorough scanning for vulnerabilities before release and ensuring that security test cases are integrated into testing protocols for changes or new features.

Furthermore, all security-related changes and tests are meticulously documented within Jira, Juniper's Agile development SDLC tool. In the unfortunate event of a cybersecurity incident, Juniper's Incident Management process is promptly activated, enabling swift and effective response and resolution. This dedicated oversight ensures that cybersecurity remains a top priority across all aspects of Juniper's operations, safeguarding our systems and data against potential threats.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Adopting an Agile-based approach to enrich and support our solution, employing industry-standard tools such as Jira and Confluence for seamless change and configuration management. Requests are meticulously logged in Jira, prioritised, and seamlessly integrated into development sprints for comprehensive testing and release to Production.

During the Quality Assurance phase, our dedicated teams meticulously craft test cases, ensuring thorough examination of security-related aspects of applied changes. Streamlined infrastructure provisioning is facilitated through Terraform, while software deployments are meticulously orchestrated via Pipelines (Azure DevOps). Each change undergoes layers of user approvals, ensuring stringent oversight and adherence to established protocols throughout development lifecycle.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Juniper partners with an esteemed external security provider for monthly network scans, covering comprehensive assessments for common vulnerabilities, including TLS versions. Identified CVE issues are promptly addressed through monthly patching routines.

Our staff undergo regular security training sessions, which encompass monthly phishing simulations. Results from these simulations are meticulously recorded, and remediation measures are promptly implemented for staff members requiring further cybersecurity training. This proactive approach ensures the continual enhancement of our network security posture and fosters a culture of awareness and preparedness among our team members.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Sisra undergoes rigorous scrutiny designed to swiftly detect any malicious activity. Our firewall takes immediate action, automatically blocking malicious traffic while notifying our internal IT team.

We adhere to stringent patch management protocol, including critical security patches for the underlying system. Our vigilance is enhanced through collaboration with industry-leading security entities. Together, we continuously monitor and analyse threats, enabling proactive mitigation.

Our dedicated team stands ready to respond, committed to addressing incidents within one hour. This approach underscores our unwavering dedication, maintaining the integrity and security of our systems, safeguarding the data and operations of our users around the clock.
Incident management type
Supplier-defined controls
Incident management approach
Boasting dedicated Incident Management teams of skilled professionals from IT, Operations, and Support departments. During incidents, this agile team convenes to address and triage the risk, meticulously documenting all pertinent details in an Incident Log.

Effective communication protocols with customers and third parties are promptly executed to ensure transparency and timely resolution. Customers have multiple channels for reporting incidents, including telephone & email support, Zen Desk tickets are promptly generated to streamline incident tracking resolution processes.

This cohesive and proactive approach ensures incidents are promptly addressed with the utmost efficiency and transparency. Delivering exceptional service support to our valued customers.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

Our organisation maintains a firm commitment to environmental stewardship, sustainability, and carbon reduction, underscored by our comprehensive Environment & Sustainability policy.
As part of this commitment, we have implemented a range of strategic initiatives to reduce our energy consumption. Notably, the installation of Passive Infrared Sensors (PIR) to most of our offices, which has proven instrumental in energy conservation. Furthermore, we actively promote recycling practices and employ responsible waste disposal methods to mitigate our environmental footprint.
In nurturing a culture of environmental responsibility within our organisation, we foster internal communications and actively engage our employees to encourage eco-friendly behaviours and practices.
We have a primarily remote or hybrid workforce, and online meetings are our default, deliberately chosen to reduce the amount of travel required from our dispersed employees. We regularly review our employee location heatmap to minimise travel generally, and to ensure opportunities for employment and progression are not limited by geography.
This collective effort is a reflection of our unwavering dedication to environmental preservation and sustainability.

Covid-19 recovery

Our organisation places paramount importance on both pandemic resilience and the assurance of a secure working environment for our entire workforce, meticulously adhering to local health guidelines and government mandates.
Our comprehensive strategy encompasses the facilitation of remote and hybrid working arrangements wherever feasible, complemented by rigorous enhancements to our cleaning protocols. Sanitiser and masks are always available in all of our office locations. Furthermore, we actively encourage employees to avail themselves of vaccination opportunities, prioritising their health and safety.
To address prospective challenges, we persistently invest in fortifying our technological infrastructure, bolstering the organisation's capacity to support remote work and collaboration. Our commitment extends to ongoing employee training initiatives, designed to prepare our workforce for any potential future adjustments.
Within our organisation, our Human Resources department diligently oversees policy adjustments, affording paramount consideration to the welfare of our employees. We are dedicated to fostering a culture of transparent communication, maintaining a continuous dialogue with our employees to grasp their concerns and requirements. We carry out regular satisfaction surveys, linked to our 5 core Values, and our HRIS has a daily pulse Happy/Neutral/Sad survey which is reviewed weekly.
We constantly review our provision of a secure and steadfast work environment, simultaneously ensuring the uninterrupted flow of our business operations. We feel adaptability and preparedness are essential.

Tackling economic inequality

Our organisation actively participates in apprenticeship programs. We are currently sponsoring an employee who is in the process of completing their Chartered Manager Degree Apprenticeship and have Apprenticeship opportunities planned for 2024.
As part of our commitment to employee development, the organisation conducts routine training reviews to identify areas for improvement among our employees. We strongly advocate for employee training and frequently enter into training agreements with our employees to facilitate their ongoing professional growth.
The provision of employee training is viewed as an investment in the advancement, cultivation, and overall prosperity of both our employees and the organisation. It yields a more proficient and engaged workforce, enhances productivity, and positions us favourably in the competitive landscape.
We have introduced a ‘Juniper Minimum Wage’ for our employees, which ensures that everyone earns a Full Time Equivalent of £22,000pa – higher than the current National Living Wage rate. This company-specific rate will be reviewed annually, and our aim is always to meet and exceed the National Living Wage rate.
5
Our organisation is dedicated to promoting diversity and inclusion throughout its supply chain. We have implemented specific policies, such as Equal Opportunities & Diversity, Conduct & Standards, Bullying & Harassment, Safeguarding Policy which actively promote the participation of a wide variety of businesses.
We diligently adhere to a transparent and equitable procurement process, with a clear emphasis on merit-based decisions that factor in supplier cost and availability. Our approach is rooted in objectivity and considers the qualifications and capabilities of suppliers without bias.
We are aware of the importance of addressing any unconscious bias, and remain committed to ensuring that our supplier selection process is impartial, based solely on merit and the ability to meet our requirements. The Facilities team actively seek RAMs/Risk assessments and manage these processes with external contractors.

Equal opportunity

Our organisation is dedicated to promoting diversity and inclusion throughout its supply chain. We have implemented specific policies, such as Equal Opportunities & Diversity, Conduct & Standards, Bullying & Harassment, Safeguarding Policy which actively promote the participation of a wide variety of businesses.
We diligently adhere to a transparent and equitable procurement process, with a clear emphasis on merit-based decisions that factor in supplier cost and availability. Our approach is rooted in objectivity and considers the qualifications and capabilities of suppliers without bias.

Wellbeing

Regular assessments are vital to our approach ensuring the well-being of our employees. We employ an independent Occupational Health service taking recommendations and advice.
We actively promote 121 meetings between employees and line managers, serving as a platform for transparent and open communication. Employees and line managers discuss goals, track progress, and seek/provide support or additional training as needed. These sessions provide a safe space for employees to address work-related stress, personal challenges, and other issues.
Our advocacy for 121 meetings with line managers plays a pivotal role in nurturing employee-manager relationships, supporting individual development, fostering open lines of communication, and ensuring alignment with our goals and values.
We provide a free-to-use Employee Assistance Platform (EAP) where employees have access to qualified and experienced counsellors, receiving advice similar to services provided by Citizens Advice. The EAP is instrumental in addressing sickness absence and presenteeism rates, offering counselling support helping employees identify the root causes of their concerns.
The well-being of every individual is our top priority. The EAP serves as one of the ways through which we offer support for mental well-being and provide a system that can make a substantial difference in our lives. This service is also open to close relatives of employees.
Our HR Information System (HRIS), NaturalHR, features a daily Pulse survey accessible to all employees. This survey allows employees to express their current emotional state by clicking on an emotion that best represents their feelings. The HR department can access this data in real-time, enabling us to promptly address any concerns arising from unhappy responses. The information is also reviewed on a weekly basis.
As a part of our commitment to employee well-being, we have provided free lunchtime learning sessions in the form of financial well-being webinars for our employees. These will be repeated annually.

Pricing

Price
£1,111.00 a licence
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Schools can have access to a demonstration school, generally for 2 weeks. This allows them to navigate around the reports, but not upload any of their own data into the system.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tenders@junipereducation.org. Tell them what format you need. It will help if you say what assistive technology you use.