Unify by Vizify - Web Data Analytics Portal
Unify provides organisations with the capability to tailor-make a sophisticated analytics portal. Integrating analytics tools such as Tableau & PowerBI, alongside web content in a single pane of glass in a fully customised, secure, and customer-facing experience. Users can seamlessly create, load, validate & manage their data processes with efficiency.
Features
- Customisable Web Based Analytics Portal
- Azure EntraID (formerly Azure Active Directory) integration
- Fully customisable styling and branding
- Role based access controls
- Responsive search allows you to find content, quickly
- Create - Effortlessly create tables in a database of choice
- Collect - Data submission module enabling crowd sourced data submission
- Validate - Instant, rigorous data validation checks on file uploads
- Rollback – Removed unwanted data or data submitted in error
- Contextual help
Benefits
- Single pane of glass Integrate analytics from across the organisation
- Drives analytics adoption
- Fully branded analytics portal - white labelled
- Secure integration with Azure Entra for RBAC
- Fully audited & tracked
- Clean & validated data curation
- Crowd source data
- Unlimited users
Pricing
£30,000 to £60,000 a unit
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
7 6 5 4 7 5 6 3 9 0 7 6 7 2 7
Contact
VIZIFY ANALYTICS LTD
Tim Archer
Telephone: 07824468046
Email: tim.archer@vizify.co.uk
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
-
Potential extension of Tableau, PowerBI, Thoughtspot, Looker.
Extension of native Azure components for cloud migration activities - Cloud deployment model
- Private cloud
- Service constraints
- N/A
- System requirements
- Azure Cloud tenancy
User support
- Email or online ticketing support
- Yes, at extra cost
- Support response times
- UK Business Hours - 4hour response SLA
- User can manage status and priority of support tickets
- No
- Phone support
- No
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Standard Maintenance - Included with cost - updates and maintenance of platform for upkeep
Extended support - Additional development requests to be costed individually
Technical account manager provided. - Support available to third parties
- No
Onboarding and offboarding
- Getting started
- Vizify will work closely with your team to fully deploy, train and onboard the relevant team members.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- Data resides on client tenancy and remains property of the client.
- End-of-contract process
- End of Contract - services will be terminated, leaving the client with underlying data assets.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- Yes
- Compatible operating systems
- Other
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Can be used via mobile application, File upload functionality is recommended through desktop browser.
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- No
- Customisation available
- Yes
- Description of customisation
-
Customised branding, content, tables
Customisation is role based via the browser.
Scaling
- Independence of resources
- Unify is deployed within a client's cloud tenancy, built with scalability in mind, services can be scaled according to demand, however, are fully dedicated to the client.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Monitoring of data uploads is fully audited and surfaced via a report within the platform.
Data validation checks
Data uploads - Successful / Failed - Reporting types
-
- Real-time dashboards
- Regular reports
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- Never
- Protecting data at rest
- Physical access control, complying with CSA CCM v3.0
- Data sanitisation process
- No
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Data will reside in a DB of choice (Azure SQLDB or Snowflake) but also within Azure Storage containers.
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- AzureSQLDB
- Snowflake
- Azure storage
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- Excel
- Azure Data Factory
Data-in-transit protection
- Data protection between buyer and supplier networks
- Private network or public sector network
- Data protection within supplier network
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- Deployments are made into the client's Azure subscription, leveraging Microsoft's cloud offerings, clients can specify services with desired SLAs.
- Approach to resilience
- Cloud redundancy options available - more details available on request.
- Outage reporting
- Notifications from cloud provider.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Access restrictions in management interfaces and support channels
- Access limited by roles based access controls linked to Azure Entra
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Alcumus
- ISO/IEC 27001 accreditation date
- 29/05/2024
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- No
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
We have an Information Security policy, Directors are responsible for maintaining and enforcing policies. Employees are required to read and understand the policies.
The following policies and procedures support the Information Security Policy and will be communicated to relevant interested parties.
• Bring your own device (BYOD) policy.
• Acceptable use policy
• Access Control Policy
• Supplier Security Policy
• Threat Intelligence
• Asset Management Procedure
• Policy on the use of Cryptographic controls
• Operations Security Policy
• Information Transfer policy
• Procedure for Change Management
• Secure Development Policy
• Incident Management Procedure
• Physical Security & Maintenance Scope
• Disposal and Destruction Policy
• Human Resources Policy
• Remote Working Policy
• Data Retention & Deletion Policy
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
When changes are proposed the Directors will decide whether the change could have a significant impact on the business.
Information provided may include:
• Who is requesting the change
• Who will implement the change
• Description of change
• System to be changed
• Date and time of change (start and end)
• Reason for change
• Impact of the change, including data, processes and customers impacted.
• Detailed technical descriptions of all steps to be carried out
• Documentation requirements
• Monitoring and evaluation process
• Back out procedure for each step of the process - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
There are two areas of defences we must address throughout our continual monitoring of Threats, these are:
• Technology: have systems and processes that are trusted and carry acceptable threat levels whilst ensuring mechanisms are in place to mitigate any rising threat levels.
• People: establish communication channels, learning and development of staff to ensure awareness and importance of threat management are understood.
To support the above, the following objectives have been established:
Identifying Threats and Emerging Threats
Assessing Vulnerabilities
Prioritising Risks
Incident Response Support
Sharing and communication
Compliance and Regulation
Improving security awareness
Sources
https://www.ncsc.gov.uk/
Threat intelligence Centre - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
Proactive blocking by design - following a Secure development policy
Identification - following threat intelligence services & proactive monitoring
Response to compromise - Communication and proactive response with the client. - Incident management type
- Supplier-defined controls
- Incident management approach
- Procedures documented in ISO27001 incident management policy - details available on request.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
-
- Health and Social Care Network (HSCN)
- Other
- Other public sector networks
- Can be deployed within specific networks in DMZ
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Tackling economic inequality
- Wellbeing
Fighting climate change
We recognise that our activities have a direct impact on the environment and we aim to promote environmental awareness amongst our employees to limit such an impact.
Whilst as a Consulting business whose services are delivered within our local market or remotely, our environmental impact is relatively limited. However, we recognise our employees can take actions to minimise environmental impact and reduce our carbon footprint. We are passionate about the environment and make sure we take concrete action to reduce the production of waste and promote recycling wherever possible, we utilise all natural resources, such as water, energy and paper in the most efficient way and promote the use of public transport limiting private travel via car and / or plane wherever possible.Tackling economic inequality
We passionately believe in creating solutions that everyone can understand and own. We believe in delivering our projects in a way that can be handed over to our partners and clients for them to own. Ensuring a full, complete knowledge transfer helps to provide skills, knowledge and confidence to our clients who may have not been exposed to the practices and techniques we leverage to solve complex analytical problems. We continually share our experiences and look to mentor and train our network.Wellbeing
Wellbeing is high on our agenda - both the well-being of our employees, clients and the wider audience of the work that we complete. We are fully committed to supporting everyone we work with as their circumstances change which can sometimes have an adverse impact on their mental health. Creating an open, inclusive environment which fosters openness and honesty without judgement is something the whole Vizify team discuss on a regular basis.
Pricing
- Price
- £30,000 to £60,000 a unit
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- Deployment & guidance of full solution for 1 month.