Data Vault
Data Vault is a method and architecture for delivering a Data Analytics Service to an enterprise supporting its Business Intelligence, Data Warehousing, Analytics and Data Science requirements. At the core it is a modern, agile way of designing and building efficient, effective Data Warehouses.
Features
- Incremental Delivery - Start small and scale up sources
- Flexibility - Requires no rework when adding additional sources
- Reduced Complexity - Separates technical data from business rules
- Raw Data Included - Back dating sources is possible
- Elegantly Supports Change Over Time
- Lineage and Audit - Includes metadata to identify sources
- High-Performance Parallel Loads - Near real-time loading possible through hashkeys
- Possible to Automate
Benefits
- Near real time data ingestion
- Uses open source software and tools as foundation
- Business Keys begin to have proper meaning
- Full lineage and traceability of data
Pricing
£700 a unit a day
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
8 3 9 2 3 3 5 8 2 0 4 5 3 5 1
Contact
Millersoft Ltd
Gerry Conaghan
Telephone: 0131 376 7114
Email: gerry@millersoftltd.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- Must use Postgres or MySQL for current service but additional SQL variants can be added at the clients request for extra cost (TBD)
- System requirements
-
- Linux
- MySQL
- Postgres
User support
- Email or online ticketing support
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Yes, at an extra cost
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- X
- Web chat accessibility testing
- X
- Onsite support
- Yes, at extra cost
- Support levels
-
L1: Tier/Level 1(T1/L1)
Initial support level responsible for basic customer issues. Gathering formation to
determine the issue by analysing the symptoms and figuring out the underlying problem.
L2: Tier/Level 2(T2/L2)
This is a more in-depth technical support level than Tier I containing experienced and more
knowledgeable personnel on a particular product or service.
L3 Tier/Level 3(T3/L3)
Individuals are experts in their fields and are responsible for not only assisting both Tier I and
Tier II personnel, but with the research and development of solutions to new or unknown
issues.
Severity Definitions
1- Critical: Proven Error of the Product in a production environment. The Product Software
is unusable, resulting in a critical impact on the operation. No workaround is available.
2- Serious: The Product will operate but due to an Error, its operation is severely restricted.
No workaround is available.
3- Moderate: The Product will operate with limitations due to an Error that is not critical to
the overall operation. For example, a workaround forces a user and/or a systems
operator to use a time consuming procedure to operate the system; or removes a nonessential
feature.
4- Due to an Error, the Product can be used with only slight inconvenience. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Introduction to Data Vaults
https://www.data-vault.co.uk/what-is-data-vault/
Included; Core Data Vault consultancy Data Vault installation and configuration Data Vault tuning Data Vault testing Security installation and configuration - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- All data resides inside the customers cloud/onprem account.
- End-of-contract process
- Support and maintenance of the service will cease.
Using the service
- Web browser interface
- No
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- No
- Customisation available
- Yes
- Description of customisation
-
We supply Data Vault set up and configuration with Postgres and MySQL but other variants of SQL can be implemented at additional cost to the client.
The service can be deployed on premise or on the cloud.
Scaling
- Independence of resources
- Setting up infrastructure based on the volume of data from source systems.
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- Never
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Various export utils through in use SQL variant. i.e Postgres Exporter - pgdump
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- SQL
- TEXT
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- JSON
- YAML
- TEXT
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Legacy SSL and TLS (under version 1.2)
- Other
- Other protection between networks
- Can also encrypt prior to transfer
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- Customer dependent.
- Approach to resilience
- AWS services are delivered from multiple datacentres worldwide. When deploying customer services to AWS, Data Vaults can be configured such that services span multiple availability zones (data centres) to ensure service resilience. Alternatively, our Disaster Recovery as a Service offer can be used to provide DR.
- Outage reporting
- AWS Cloudwatch alerts can be created
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Access to management interfaces and support channels is restricted through a combination of username and passwords, multifactor authentication, firewalling, IP restrictions, the use of bastion hosts as appropriate.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- Cyber Essentials
- Information security policies and processes
- Millersoft Data Vault service follows AWS best practice on security https://aws.amazon.com/security/. We have a range of technical and organisational measures to ensure data security and protection. These cover Access, Roles and Responsibilities, Resource/asset management, Access Control & Authentication, Workstation & Device Security, Network/Communications Security, Back-up, mobile/portable device security, and physical security of our premises. Staff training and awareness is ongoing, staff / contractors must sign confidentiality and privacy statements and read and sign company security policy. Sanctions are applicable for non-compliance. Our reporting structure if a security breach happens or is suspected: staff are trained to and required to immediately flag to DPO and CEO and lock down or isolate the breach where feasible; DPO/CEO will take immediate action including isolation or lock down of affected systems, notification to affected parties, implementation of business continuity and disaster recovery. Risk impact reviews are conducted when a new data category is processed, or system implemented, and security measures adapted as necessary. Category logs, training logs, access logs, and breach logs are maintained, reviewed and signed off periodically by the assigned DPO and CEO.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
All code is under version control using git.
Jenkins is used to build releases.
An automated test framework is used for integration testing.
Changes are tracked via jira.
Cloudformation is used to deploy via AWS Marketplace. - Vulnerability management type
- Undisclosed
- Vulnerability management approach
-
Solution is deployed into customer's AWS VPC via AWS Cloudformation.
External access is configured via customer and GUI is locked down via AWS security groups.
SSH access is also locked down via security group and PEM file.
The access is as secure as the customers network.
Patches are in the form of new AWS AMIs. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- All logs go to AWS Cloudwatch for auditing, monitoring and alerting
- Incident management type
- Supplier-defined controls
- Incident management approach
- Each instance runs within a VPC within the customers AWS Account. There is no external access or monitoring. Issues need to be reported to the supplier and logs supplied for external analysis.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Tackling economic inequalityTackling economic inequality
We believe that our social mission to assist young people into employment is compatible with the guidelines laid out in the Governments Social Value theme of tacking economic inequality (MAC 2.2). Wherever it has the opportunity to do so, Millersoft has and continues to offer placements, internships and employment to technology students from the deprived local area studying in local colleges and universities with whom we hold relations. Our method is to provide initial training and inductions to suitable internees before assigning them to live projects, where they are monitored, supported, challenged, and encouraged by experienced senior consultants and developers. As an organisation that values fresh and radical ideas to find new products and solutions to solve existing problems, internees are also encouraged to share their thoughts and ideas in a stimulating and collaborative environment, and often asked to implement, test and deploy them into real world projects. Regular development reviews are held with internees and progress objectives adapted accordingly. Internees, as is the case with all staff, receive regular training in the latest technologies which may cover Cloud Technologies (staff are trained to be Amazon Web Service Engineers and Architects), data processing tools, database management, project management, security. In most cases internees become full time employees at Millersoft once they graduate and are already well equipped to take on more responsibility and autonomy within the company.
Pricing
- Price
- £700 a unit a day
- Discount for educational organisations
- No
- Free trial available
- No