Skip to main content

Help us improve the Digital Marketplace - send your feedback

VIZIFY ANALYTICS LTD

Unify by Vizify - Web Data Analytics Portal

Unify provides organisations with the capability to tailor-make a sophisticated analytics portal. Integrating analytics tools such as Tableau & PowerBI, alongside web content in a single pane of glass in a fully customised, secure, and customer-facing experience. Users can seamlessly create, load, validate & manage their data processes with efficiency.

Features

  • Customisable Web Based Analytics Portal
  • Azure EntraID (formerly Azure Active Directory) integration
  • Fully customisable styling and branding
  • Role based access controls
  • Responsive search allows you to find content, quickly
  • Create - Effortlessly create tables in a database of choice
  • Collect - Data submission module enabling crowd sourced data submission
  • Validate - Instant, rigorous data validation checks on file uploads
  • Rollback – Removed unwanted data or data submitted in error
  • Contextual help

Benefits

  • Single pane of glass Integrate analytics from across the organisation
  • Drives analytics adoption
  • Fully branded analytics portal - white labelled
  • Secure integration with Azure Entra for RBAC
  • Fully audited & tracked
  • Clean & validated data curation
  • Crowd source data
  • Unlimited users

Pricing

£30,000 to £60,000 a unit

  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tim.archer@vizify.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

7 6 5 4 7 5 6 3 9 0 7 6 7 2 7

Contact

VIZIFY ANALYTICS LTD Tim Archer
Telephone: 07824468046
Email: tim.archer@vizify.co.uk

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Potential extension of Tableau, PowerBI, Thoughtspot, Looker.
Extension of native Azure components for cloud migration activities
Cloud deployment model
Private cloud
Service constraints
N/A
System requirements
Azure Cloud tenancy

User support

Email or online ticketing support
Yes, at extra cost
Support response times
UK Business Hours - 4hour response SLA
User can manage status and priority of support tickets
No
Phone support
No
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Standard Maintenance - Included with cost - updates and maintenance of platform for upkeep
Extended support - Additional development requests to be costed individually
Technical account manager provided.
Support available to third parties
No

Onboarding and offboarding

Getting started
Vizify will work closely with your team to fully deploy, train and onboard the relevant team members.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
Data resides on client tenancy and remains property of the client.
End-of-contract process
End of Contract - services will be terminated, leaving the client with underlying data assets.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
Yes
Compatible operating systems
Other
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Can be used via mobile application, File upload functionality is recommended through desktop browser.
Service interface
No
User support accessibility
None or don’t know
API
No
Customisation available
Yes
Description of customisation
Customised branding, content, tables
Customisation is role based via the browser.

Scaling

Independence of resources
Unify is deployed within a client's cloud tenancy, built with scalability in mind, services can be scaled according to demand, however, are fully dedicated to the client.

Analytics

Service usage metrics
Yes
Metrics types
Monitoring of data uploads is fully audited and surfaced via a report within the platform.
Data validation checks
Data uploads - Successful / Failed
Reporting types
  • Real-time dashboards
  • Regular reports

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Staff screening not performed
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
Never
Protecting data at rest
Physical access control, complying with CSA CCM v3.0
Data sanitisation process
No
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Data will reside in a DB of choice (Azure SQLDB or Snowflake) but also within Azure Storage containers.
Data export formats
  • CSV
  • Other
Other data export formats
  • AzureSQLDB
  • Snowflake
  • Azure storage
Data import formats
  • CSV
  • Other
Other data import formats
  • Excel
  • Azure Data Factory

Data-in-transit protection

Data protection between buyer and supplier networks
Private network or public sector network
Data protection within supplier network
IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
Deployments are made into the client's Azure subscription, leveraging Microsoft's cloud offerings, clients can specify services with desired SLAs.
Approach to resilience
Cloud redundancy options available - more details available on request.
Outage reporting
Notifications from cloud provider.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
Access restrictions in management interfaces and support channels
Access limited by roles based access controls linked to Azure Entra
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
Alcumus
ISO/IEC 27001 accreditation date
29/05/2024
What the ISO/IEC 27001 doesn’t cover
N/A
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
No
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
We have an Information Security policy, Directors are responsible for maintaining and enforcing policies. Employees are required to read and understand the policies.
The following policies and procedures support the Information Security Policy and will be communicated to relevant interested parties.
• Bring your own device (BYOD) policy.
• Acceptable use policy
• Access Control Policy
• Supplier Security Policy
• Threat Intelligence
• Asset Management Procedure
• Policy on the use of Cryptographic controls
• Operations Security Policy
• Information Transfer policy
• Procedure for Change Management
• Secure Development Policy
• Incident Management Procedure
• Physical Security & Maintenance Scope
• Disposal and Destruction Policy
• Human Resources Policy
• Remote Working Policy
• Data Retention & Deletion Policy

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
When changes are proposed the Directors will decide whether the change could have a significant impact on the business.  
Information provided may include:  
• Who is requesting the change
• Who will implement the change
• Description of change   
• System to be changed   
• Date and time of change (start and end)   
• Reason for change   
• Impact of the change, including data, processes and customers impacted.   
• Detailed technical descriptions of all steps to be carried out
• Documentation requirements
• Monitoring and evaluation process
• Back out procedure for each step of the process
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
There are two areas of defences we must address throughout our continual monitoring of Threats, these are:
• Technology: have systems and processes that are trusted and carry acceptable threat levels whilst ensuring mechanisms are in place to mitigate any rising threat levels.

• People: establish communication channels, learning and development of staff to ensure awareness and importance of threat management are understood.

To support the above, the following objectives have been established:
Identifying Threats and Emerging Threats
Assessing Vulnerabilities
Prioritising Risks
Incident Response Support
Sharing and communication
Compliance and Regulation
Improving security awareness

Sources
https://www.ncsc.gov.uk/
Threat intelligence Centre
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Proactive blocking by design - following a Secure development policy
Identification - following threat intelligence services & proactive monitoring
Response to compromise - Communication and proactive response with the client.
Incident management type
Supplier-defined controls
Incident management approach
Procedures documented in ISO27001 incident management policy - details available on request.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
Yes
Connected networks
  • Health and Social Care Network (HSCN)
  • Other
Other public sector networks
Can be deployed within specific networks in DMZ

Social Value

Social Value

Social Value

  • Fighting climate change
  • Tackling economic inequality
  • Wellbeing

Fighting climate change

We recognise that our activities have a direct impact on the environment and we aim to promote environmental awareness amongst our employees to limit such an impact.

Whilst as a Consulting business whose services are delivered within our local market or remotely, our environmental impact is relatively limited. However, we recognise our employees can take actions to minimise environmental impact and reduce our carbon footprint. We are passionate about the environment and make sure we take concrete action to reduce the production of waste and promote recycling wherever possible, we utilise all natural resources, such as water, energy and paper in the most efficient way and promote the use of public transport limiting private travel via car and / or plane wherever possible.

Tackling economic inequality

We passionately believe in creating solutions that everyone can understand and own. We believe in delivering our projects in a way that can be handed over to our partners and clients for them to own. Ensuring a full, complete knowledge transfer helps to provide skills, knowledge and confidence to our clients who may have not been exposed to the practices and techniques we leverage to solve complex analytical problems. We continually share our experiences and look to mentor and train our network.

Wellbeing

Wellbeing is high on our agenda - both the well-being of our employees, clients and the wider audience of the work that we complete. We are fully committed to supporting everyone we work with as their circumstances change which can sometimes have an adverse impact on their mental health. Creating an open, inclusive environment which fosters openness and honesty without judgement is something the whole Vizify team discuss on a regular basis.

Pricing

Price
£30,000 to £60,000 a unit
Discount for educational organisations
No
Free trial available
Yes
Description of free trial
Deployment & guidance of full solution for 1 month.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tim.archer@vizify.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.