DATALYTYX DataOps Platform
DataOps for Snowflake is ONE platform for 100% of your DataOps lifecycle to enable agility &responsiveness, with no compromise on data security & governance. Provides orchestration, environment management, CICD, automated testing, & ELT wrapped in an elegant UI. Faster development, parallel collaboration, increased efficiencies, reduced costs, data assurance, simplified orchestration.
Features
- Automated ELT Data Ingestion
- End to end automation and oechestration
- Environment management
- CI/CD and DevOps for Data
- Automated testing
- Audit, security and governance
- Collaboration and self-services
- Monitoring and alerting of all data pipelines
- Feature branch data warehouses
- Spin up platform in 24 hours
Benefits
- Brings Agile and DevOps to data
- happy business users and stakeholders
- Move source of truth to outside you data warehouse
- One massively scalable platform for all of your data pipelines
- automation of everyting
- lower totoal caost of data warehouse ownership
- no loss of governance or security
- One platform for all your DataOps needs
Pricing
£1,000 a user a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
7 4 4 7 1 1 0 4 7 8 7 7 9 6 7
Contact
Datalytyx Ltd
Iain Butler
Telephone: +44 (0)7950165829
Email: sales@datalytyx.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Service constraints
- N/A
- System requirements
- N/A
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Support requests/questions vary in response time based on priority status ranging from 1 (most severe) to 4 (least severe).
Priority 1 – 1 service hour
Priority 2 – 2 service hours
Priority 3 – 4 service hours
Priority 4 – 8 service hours - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- We provide a standard support level included in all of our engagements, with phone, email and web chat support from 0830-1800 Monday through Friday. Additional support is available at an extra cost which could include onsite support and after hours and weekend support.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- A defined process exists whereby within 24 hours, an introduction email and license entitlement is provided to thenominated customer contact. A Proactive Customer Onboarding representative will set up a call within one week to arrange the details required to provide our support services.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- Via API
- End-of-contract process
- To be agreed upon during contract negotiations.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- End-to-end monitoring via DataDog.
- Accessibility standards
- None or don’t know
- Description of accessibility
- The interface can be customised but generally allows the user to perform data ingestion, visualization, and real-time analysis of large-scale log files.
- Accessibility testing
- N/A
- API
- Yes
- What users can and can't do using the API
- Users can extract data and integrate monitoring tools.
- API documentation
- Yes
- API documentation formats
-
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- No
Scaling
- Independence of resources
- N/A
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Snowflake Computing, Talend, Databricks, AWS, Azure
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Via an API
- Data export formats
-
- CSV
- Other
- Other data export formats
- Any
- Data import formats
-
- CSV
- Other
- Other data import formats
- Any
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- SLAs to be defined and monitored at the start of the engagement.
- Approach to resilience
- Available on request.
- Outage reporting
- API, email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Access restrictions in management interfaces and support channels
- There are multiple options for configuring access in management interfaces that can be implemented at the beginning of an engagement.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Username or password
Audit information for users
- Access to user activity audit information
- You control when users can access audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- You control when users can access audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Certified Information Systems Limited
- ISO/IEC 27001 accreditation date
- 15/10/2015
- What the ISO/IEC 27001 doesn’t cover
- Our certification applies to the provision of trusted and managed information security services to internal and external customers of Datalytyx Ltd.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- No
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Processes and practices are periodically audited by independent auditors, and all code check-ins go through rigorous code and security reviews. Strict change-management processes are adhered to. For example, all data in databases are encrypted, and the cloud environment is routinely scanned for vulnerabilities.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Strict change-management processes are adhered to. For example, all data in databases are encrypted, and the cloud environment is routinely scanned for vulnerabilities.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Processes and practices are periodically audited by independent auditors, and all code check-ins go through rigorous code and security reviews. Strict change-management processes are adhered to. For example, all data in databases are encrypted, and the cloud environment is routinely scanned for vulnerabilities.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Processes and practices are periodically audited by independent auditors, and all code check-ins go through rigorous code and security reviews. Strict change-management processes are adhered to. For example, all data in databases are encrypted, and the cloud environment is routinely scanned for vulnerabilities.
- Incident management type
- Supplier-defined controls
- Incident management approach
- All known vulnerabilities are listed on partner technology Security Bulletins and in the release notes for the product and version where they are fixed. In addition, all vulnerabilities are reported to the National Vulnerability Database and have an assigned CVE number.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Wellbeing
-
Wellbeing
Datalytyx has transitioned to a hybrid working model during the pandemic, allowing employees to work from home as desired and to use our office space during periods when lockdowns were lifted.
We continue to operate in hybrid working model.
This has helped our employees to work flexibly while supporting family while also providing an option to interact with colleagues and maintain healthy relationships.
Pricing
- Price
- £1,000 a user a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
-
Full access to everything
14 days free - Link to free trial
- https://aws.amazon.com/marketplace/pp/B0872LLH2C