Cloud Data Sense
VE3's Cloud Data Sense is a sophisticated data mapping and classification tool designed for both hybrid cloud and on-premise environments. Powered by advanced AI algorithms, it offers automated controls and comprehensive reporting features, enabling you to maintain complete oversight of your data at all times.
Features
- Data Mapping
Benefits
- Discover Stale Data
Pricing
£175 to £850 a unit
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
7 9 2 5 8 5 5 2 6 3 5 5 4 8 5
Contact
Ve3 Global Ltd
Nikhil Alex
Telephone: 02045520840
Email: prime@ve3.global
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Hybrid cloud
- Service constraints
- No
- System requirements
-
- Access To File Shares and Data Sources
- Root Priviledges required for Cloud Data Sense data Collector
- Access to DB tables
- Outbound Access Requirements (not required for Dark site)
- Configure option for SaaS, On premises or Dark site configuration
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- P1 - 30 Minutes, P2 - 2 Hours, P3 - 8 Hours, P4 - 24 Hours
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web chat accessibility testing
-
NetApp offers comprehensive support for Cloud Manager and its associated cloud services through various channels. Here’s how you can access our support:
Free Self-Support Options (Available 24/7):
Knowledge Base: Search the Cloud Manager Knowledge Base for articles that can help troubleshoot your issues.
Communities: Engage with the Cloud Manager community in ongoing discussions or start your own.
Documentation: Access Cloud Manager documentation online anytime.
Feedback Email: Your feedback is important to us. Email us to help improve Cloud Manager.
Technical Support with NetApp Support Engineers:
After activating your support plan, you can also receive assistance from a NetApp Support Engineer for more complex issues.
Steps to Access Support:
In Cloud Manager, navigate to Help > Support.
Under Technical Support, you have the following options:
Call Us: Click to find phone numbers for direct access to NetApp technical support.
Open an Issue: Select the relevant issue type and click Send to submit your case. - Onsite support
- Yes, at extra cost
- Support levels
- We provide a Cloud Data Sense Implementation Service which is run by your Professional Services team. They will help to identify success criteria, deploy the service and ensure data sources are plugged in correctly.
- Support available to third parties
- No
Onboarding and offboarding
- Getting started
- There is online documentation available for Cloud Data Sense online - https://docs.netapp.com/us-en/cloud-manager-data-sense/index.html
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- With Cloud Data Sense, you have the flexibility to export data directly into an Excel spreadsheet. This allows you to manipulate, analyze, or use the data according to your specific needs
- End-of-contract process
- The data scanning stops and you will be unable to access the service
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Linux or Unix
- MacOS
- Windows
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- As the service is simply accessed through a browser, users can access the service from any device that have a supported browser.
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- Description of service interface
- NetApp's cloud services are mainly accessed through our Cloud Manager portal. This is a WebGUI that is really easy to access and navigate through
- Accessibility standards
- None or don’t know
- Description of accessibility
- NetApp's cloud services are mainly accessed through our Cloud Manager portal. This is a WebGUI that is really easy to access and navigate through
- Accessibility testing
- Cloud Data Sense uses the CI/CD model where new features are delivered through beta testing through NetApp personel and users who are selected to the beta testing program. Once testing is complete the service is updated.
- API
- No
- Customisation available
- No
Scaling
- Independence of resources
- As you deploy the service within your own environment (cloud or on-premises), other users consuming the service will not impact you.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Data Scanned, Data Sensitivity, Where Data Is Stored, Permissions Associated
- Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Reseller providing extra support
- Organisation whose services are being resold
- Netapp
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
- Other
- Other data at rest protection approach
- Cloud Data Sense is designed to operate seamlessly within the customer's environment, whether it is hosted on-premise or in the cloud. For on-premise setups, customers can implement storage-level encryption to secure their data. When hosted in the cloud, encryption is typically provided by the cloud service provider, ensuring data is protected according to industry standards.
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- Cloud Data Sense provides the capability to export data into an Excel spreadsheet, enabling you to utilize the data as needed for further analysis or reporting
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- The hosting location chosen by the customer—whether on-premise or in the cloud—affects the availability of Cloud Data Sense. For cloud-hosted environments, availability is determined by the third-party cloud service provider's design and is governed by their specific Service Level Agreements (SLAs). If hosted on-premise, the customer is responsible for ensuring the availability of the underlying infrastructure to maintain service continuity.
- Approach to resilience
- It's available on request
- Outage reporting
- Reports can be configured from Cloud Manager https://status.services.cloud.netapp.com
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Access restrictions in management interfaces and support channels
- Authentication is federated with an external provider (Auth0 by default) using username / password. Auth0 authenticates username and password and passes JWT token into users browser cookie space. Federation to existing IAM is supported via ADFS in Microsoft AD , for more information see: https://services.cloud.netapp.com/misc/federation-support
- Access restriction testing frequency
- Less than once a year
- Management access authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Other
- Description of management access authentication
- Authentication is federated with an external provider (Auth0 by default) using username / password. Auth0 authenticates username and password and passes JWT token into users browser cookie space. Federation to existing IAM is supported via ADFS in Microsoft AD , for more information see: https://services.cloud.netapp.com/misc/federation-support
Audit information for users
- Access to user activity audit information
- No audit information available
- Access to supplier activity audit information
- No audit information available
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- EGAC
- ISO/IEC 27001 accreditation date
- 06/01/2024
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
-
- ISO 14000-1
- ISO 22301
- ISO 9000-1
- ISO 20000-1
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
NetApp has a structured approach to managing and communicating vulnerabilities to our customers:
Vulnerability Report Receipt: Upon receiving a vulnerability report, it is logged for further action.
Verification: NetApp PSIRT engineers verify the vulnerability using the CVSS framework and assess its impact.
Resolution Development: Our team develops a solution to address the verified vulnerability.
Notification: NetApp informs customers of the vulnerability, providing just enough information for customers to understand the impact on their environment and the steps necessary for mitigation.
Attribution: Identifying the source or cause of the vulnerability as part of our comprehensive response.
Standard Delivery Methods for Security Information:
Security Advisory: Information about significant vulnerabilities that might affect NetApp products and might require upgrades, patches, or specific actions from customers to remedy.
Security Bug Report: Details on low-severity or non-issues (false positives), accessible through Bugs Online, requiring customer login for access.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- NetApp uses industry-standard source code control methods (implemented using the (third-party) Perforce product). We use industry-standard bug-tracking methods implemented using a home-grown tool known as BURT. Release Management consists of a closely monitored interaction between these two tools and industry-standard development methods along with source code review and development change control cycles.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
The following industry standards and mandates guide the handling of product vulnerabilities at NetApp and the disclosure of vulnerabilities to our customers and the broader technology community:
National Infrastructure Advisory Council (NIAC) – Disclosing and Managing Vulnerability Guidelines
ISO/IEC 29147:2014(E) – Information technology — Security techniques — Vulnerability disclosure
ISO/IEC 30111:2013(E) – Information technology — Security techniques — Vulnerability handling processes - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
The following industry standards and mandates guide the handling of product vulnerabilities at NetApp and the disclosure of vulnerabilities to our customers and the broader technology community:
National Infrastructure Advisory Council (NIAC) – Disclosing and Managing Vulnerability Guidelines
ISO/IEC 29147:2014(E) – Information technology — Security techniques — Vulnerability disclosure
ISO/IEC 30111:2013(E) – Information technology — Security techniques — Vulnerability handling processes - Incident management type
- Supplier-defined controls
- Incident management approach
-
NetApp has established comprehensive incident management procedures to address a wide range of security incidents, which include:
Intrusion
Denial of Service (DoS)
Malicious Code
Malicious Communications
Misuse of Resources
Details on the recovery strategies NetApp employs in the event of a cyber attack are considered confidential and proprietary. However, NetApp conducts regular and successful testing of these scenarios to ensure preparedness and continues to refine our strategies to handle future cyber threats effectively.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Our G-Cloud service provision is deeply committed to fighting climate change, recognizing the urgent need for collective action to address environmental challenges. Here's how our services deliver against this social value theme:
Environmental Sustainability in Operations:
We prioritize running efficient operations to reduce emissions and minimize environmental impacts. This includes implementing energy-efficient practices, optimizing resource usage, and adopting renewable energy sources wherever possible within our data centers and infrastructure.
Promoting Sustainable Practices:
VE3 actively engages with our suppliers and clients to promote sustainable business practices. Through our services, we advocate for the adoption of environmentally friendly technologies, responsible sourcing, and waste reduction strategies, thereby reducing carbon footprints across the supply chain.
Responsible by Design Framework:
Our G-Cloud services adhere to a 'Responsible by Design' framework, ensuring that environmental considerations are integrated into the development and deployment of digital solutions. By prioritizing environmental protection and minimizing negative impacts, we strive to deliver sustainable outcomes for our clients.
Training and Education:
VE3 invests in training and education programs focused on environmental sustainability. Through initiatives like the Sustainability Quotient (SQ) training, we equip our teams with the knowledge and skills to adopt climate-smart behaviors and implement environmentally conscious practices in their work.
Community Engagement:
We actively engage with communities to support environmental objectives and promote climate action. By partnering with local organizations and stakeholders, we contribute to initiatives aimed at addressing climate change, such as tree planting programs, clean energy projects, and environmental education campaigns.Covid-19 recovery
Our G-Cloud service provision plays a crucial role in supporting the COVID-19 recovery effort by facilitating resilience, adaptation, and innovation in the face of unprecedented challenges. Here's how our services contribute to the recovery process:
Remote Work Enablement:
VE3's digital solutions empower organizations to transition to remote work seamlessly. By providing secure and reliable cloud-based infrastructure, collaboration tools, and remote access solutions, we enable businesses to maintain productivity while ensuring the safety and well-being of their employees.
Business Continuity Planning:
We assist organizations in developing and implementing robust business continuity plans to mitigate disruptions caused by the pandemic. Our services include data backup and recovery solutions, disaster recovery planning, and resilience testing to ensure operational continuity in the face of unforeseen events.
Digital Transformation Acceleration:
VE3 accelerates digital transformation initiatives to help organizations adapt to the new normal. By modernizing legacy systems, implementing cloud-based technologies, and digitizing processes, we enable businesses to optimize efficiency, improve agility, and remain competitive in a rapidly evolving landscape.
Healthcare Support Solutions:
We provide specialized healthcare support solutions to assist frontline workers and healthcare organizations in responding to the COVID-19 crisis. This includes telemedicine platforms, patient management systems, and data analytics tools to enhance patient care, streamline operations, and support decision-making processes.
Economic Stimulus through Innovation:
VE3 fosters innovation and entrepreneurship to stimulate economic recovery in the aftermath of the pandemic. Through our G-Cloud services, we support startups, small businesses, and enterprises in developing and deploying innovative solutions that address emerging challenges, create new opportunities, and drive economic growth.Tackling economic inequality
We recognize the importance of tackling economic inequality and are committed to leveraging our G-Cloud service provision to address this pressing social issue. Here's how our services contribute to tackling economic inequality:
Access to Affordable Technology:
We strive to make cutting-edge technology accessible and affordable to all, regardless of economic status. By offering scalable and cost-effective cloud-based solutions, we enable organizations, including small and medium-sized enterprises (SMEs) and underserved communities, to access the tools and resources they need to compete in the digital economy.
Skills Development and Training:
VE3 invests in skills development and training programs to empower individuals with the knowledge and expertise needed to thrive in the digital age. Through initiatives like online courses, certifications, and workshops, we equip people from diverse backgrounds with the skills required for high-demand roles in technology and innovation, thereby enhancing their employability and economic prospects.
Support for Minority-Owned Businesses:
We actively support minority-owned businesses and entrepreneurs by providing access to mentorship, networking opportunities, and resources to help them grow and succeed. Through initiatives like supplier diversity programs and partnerships with minority business organizations, we promote inclusion and diversity in the technology sector and contribute to creating more equitable economic opportunities.
Digital Inclusion Initiatives:
VE3 is committed to promoting digital inclusion and bridging the digital divide by ensuring that everyone has access to essential digital services and technologies. We collaborate with governments, nonprofits, and community organizations to implement initiatives such as digital literacy programs, affordable internet access schemes, and community technology centers, thereby empowering underserved populations and promoting economic equity.
Fair and Transparent Procurement Practices:
We adhere to fair and transparent procurement practices to create opportunities for businesses of all sizes and backgrounds to participate in government contracts and procurement processes.Equal opportunity
We recognize the importance of tackling economic inequality and are committed to leveraging our G-Cloud service provision to address this pressing social issue. Here's how our services contribute to tackling economic inequality:
Access to Affordable Technology:
We strive to make cutting-edge technology accessible and affordable to all, regardless of economic status. By offering scalable and cost-effective cloud-based solutions, we enable organizations, including small and medium-sized enterprises (SMEs) and underserved communities, to access the tools and resources they need to compete in the digital economy.
Skills Development and Training:
VE3 invests in skills development and training programs to empower individuals with the knowledge and expertise needed to thrive in the digital age. Through initiatives like online courses, certifications, and workshops, we equip people from diverse backgrounds with the skills required for high-demand roles in technology and innovation, thereby enhancing their employability and economic prospects.
Support for Minority-Owned Businesses:
We actively support minority-owned businesses and entrepreneurs by providing access to mentorship, networking opportunities, and resources to help them grow and succeed. Through initiatives like supplier diversity programs and partnerships with minority business organizations, we promote inclusion and diversity in the technology sector and contribute to creating more equitable economic opportunities.
Digital Inclusion Initiatives:
VE3 is committed to promoting digital inclusion and bridging the digital divide by ensuring that everyone has access to essential digital services and technologies. We collaborate with governments, nonprofits, and community organizations to implement initiatives such as digital literacy programs, affordable internet access schemes, and community technology centers, thereby empowering underserved populations and promoting economic equity.
Fair and Transparent Procurement Practices:
We adhere to fair and transparent procurement practices to create opportunities for businesses of all sizes and backgrounds to participate in government contracts and procurement processes.Wellbeing
Environmental Sustainability:
We are committed to environmental sustainability as a core component of wellbeing. By prioritizing eco-friendly practices, resource conservation, and carbon reduction efforts in our operations and services, we contribute to creating a healthier and more sustainable environment. We prioritize the wellbeing of individuals and communities in all aspects of our G-Cloud service provision. Here's how our services contribute to enhancing wellbeing:
User-Centric Design:
VE3 designs our G-Cloud services with a user-centric approach, prioritizing usability, accessibility, and intuitive design. By focusing on the needs and preferences of users, we create digital experiences that enhance overall wellbeing by reducing frustration, stress, and cognitive load.
Health and Safety Protocols:
We implement robust health and safety protocols to protect the wellbeing of employees, clients, and partners. This includes adherence to strict security standards, data privacy regulations, and compliance with industry best practices to ensure the safety and integrity of our digital infrastructure and services.
Promotion of Work-Life Balance:
VE3 recognizes the importance of work-life balance in maintaining overall wellbeing. Through our G-Cloud services, we enable remote work, flexible scheduling, and collaboration tools that empower individuals to achieve a healthy balance between their professional and personal lives, leading to greater job satisfaction and wellbeing.
Mental Health Support:
We prioritize mental health support for our employees and clients by offering resources, programs, and initiatives aimed at promoting mental wellbeing. This includes access to counseling services, mindfulness training, stress management workshops, and employee assistance programs designed to support individuals in times of need.
Community Engagement and Social Impact:
VE3 actively engages with communities to address social determinants of health and promote holistic wellbeing. Through partnerships, philanthropic initiatives, and volunteer efforts, we support local organizations and projects focused on improving access to healthcare, education, housing, and other essential services that contribute to overall community wellbeing.
Pricing
- Price
- £175 to £850 a unit
- Discount for educational organisations
- Yes
- Free trial available
- No