Data Integration, Management, Analytics & AI Solutions
Data Technology are a data specialist firm delivering solutions in modernising your data platform including; CDC, ETL / ELT integration strategies with the Microsoft and Talend stack, Data warehousing with Snowflake and Databricks, analytics with Qlik and Power BI and AI / Machine Learning with Microsoft Azure and DataRobot.
Features
- Predictive Model building & Data Science consulting
- Data integration including CDC & ETL/ELT
- Microsoft Azure Data Platform
- Qlik and Talend Data Integration Platform
- Data Warehousing with Snowflake and Databricks
- Data Modernisation with AWS and Microsoft Azure
- Data Strategy and Data Literacy Consulting
- PowerBI and Qlik Services
- External Analytics Platform
- Data Quality, Data Catalogue & Data Lineage
Benefits
- Self-Service Analytics - improved user adoption
- Mash-up to publish on the web
- Modernisation of your Data stack
- Integrating data from multiple sources
- Enterprise ready for large Data volumes
- Data governance and improvement of Data Quality
- Improved decision-making with actionable intelligence
- Helping organisations improve Data literacy
- Helping organisations build Data strategy and roadmaps
- Reducing the cost of managing and operating Data stacks
Pricing
£10,000 an instance a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
7 2 7 3 9 6 1 1 4 8 2 6 7 3 1
Contact
Data Technology Ltd
Seatal Patel
Telephone: 01923235753
Email: sxp@datatechnology.co.uk
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- Salesforce.com, SAP, Oracle and various other ERP , HR & transactional platforms
- Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
- Planned maintenance and upgrade
- System requirements
-
- Microsoft SQL
- Anti-Virus software
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- 9am to 5:30pm Monday to Friday, Excludes UK bank holidays.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- There are four levels of support, depending on severity as detailed in our Service Definition document. The cost for this support is included in the annual subscription cost and we do provide a technical account manager.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Data Technology has a tried and proven best-practice service implementation methodology which comprises of;
- Installation, implementation, training & consultancy. Each of these can be delivered remotely or on-site.
- Business Intelligence and analytics solutions are expected to evolve as your organisation benefits from the features of the software and the maturity in using it increases.
We are committed to help customers with knowledge transfer and create a centre of excellence within their companies. We also offer our customers integration services to assist with Data Quality, Data Wrangling, Blending and Integration to prepare it for enterprise search and predictive analytics.
Our Data Scientists are experienced in working with technologies such as R,Python etc. to deliver you world-class models and deploy them within your BI platform or into your transnational systems.
We offer a on-going Application Management service, which includes regular health checks and inclusive development days (if required) to lower your TCO. - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- The original data source is held by the users and our software only takes snapshots on an ongoing basis. Should an extraction be necessary, we can provide a API to do that. We will work closely with you to understand your off-boarding requirements and charge on a time & material basis.
- End-of-contract process
- There are no additional costs at the end of a contract, unless data extraction services are required and the customer has given us due notice within the cancellation time specified in the contract.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Our Qlik platform works seamlessly on mobile and desktops, however the other platforms may need further configuration to render on mobile devices.
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 A
- Description of service interface
- The interface has been developed by the software vendors, which have enabled the users to gain access to applications developed with the software vendors platform.
- Accessibility standards
- None or don’t know
- Description of accessibility
- Via a web browser
- Accessibility testing
- N/A - software developers develop the software
- API
- No
- Customisation available
- Yes
- Description of customisation
- Dashboards, Data Integration, Visualisations, Search, Predictive Models, Security are all customise-able. Users can customise if they have the security credentials and then publish to the live environment if authorised to do so,
Scaling
- Independence of resources
- We have governance performance measuring procedures in place to ensure we are upholding the service levels.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Service metrics are customised by individual customers, but typically we can provide the following;
-Issues since last QBR
-Improvements and recommendations
-Priority outages and action taken
-Help desk calls
-Licence allocation and governance
-New release recommendations - Reporting types
-
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Qlik, DataRobot, AWS, Snowflake, Databricks, Talend & Microsoft Azure
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Users have the option of exporting their data to excel by using the export button. This access can be controlled by user.
- Data export formats
- CSV
- Data import formats
-
- CSV
- Other
- Other data import formats
- Excel
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- The SLAs are included in the Service Definition document and the compensation for missing guaranteed levels of availability are agreed with the customer on a case by case basis depending on the service purchased.
- Approach to resilience
- Our datacentre resiliency is based upon Microsoft Azure standards and further details will be available upon request.
- Outage reporting
- Email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
-
Authentication of users is via a Management Console, which utilises active directory credentials or a IDP, such as Okta which can leverage two-factor authentication protocols.
Authorisation of users is also via the Management Console and restricts access to applications and data at the user level. - Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- We have ISMS procedures in place (not ISO27001 compliant though). We also have Cyber Essentials Plus certification.
- Information security policies and processes
- We have ISMS procedures in place . We also ensure all our staff have Information Security training and our Technical staff are security cleared.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Change Management procedure controls any additions, deletions, or modifications to the company’s configuration of desktops, servers and network hardware and/or software.
Any changes could have an impact on the security posture of the company’s environment, due to rules used to establish the systems.
Staff members assigned to the Change Management Process must approve any changes. When a change request is received, it should
be evaluated using:
Schedule
Resources
Security
All requests for changes must be evaluated and approved in order to recognise and control security and access. Use a change request form that can record submissions, investigation, review, and approval. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- We are in the Microsoft Azure cloud and we are reliant on Microsoft to inform us of any vulnerabilities and deploy patches.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
We identify potential compromises by constant monitoring of our systems and 3rd party penetration testing.
As soon as a compromise has been raised measures must be taken to contain the breach as per our Data Breach Policy and Procedures.
We respond to incidents with the upmost of urgency and put measures in place as soon as practical. - Incident management type
- Supplier-defined controls
- Incident management approach
- We have a Data Breach Policy/Procedure process in place. We provide any incident reports initially by a phone call, followed up by written electronic correspondence.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Equal opportunity
- Wellbeing
Equal opportunity
We have an equal opportunity policy in place. It is also included in our employee handbook.Wellbeing
We have an EAP program in place for all staff, as well as sections around wellbeing in our employee handbook.
Pricing
- Price
- £10,000 an instance a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Free cloud instance for 30 days, including a POC. Support, implementation & development are not included.