Data Analytics Framework
A cloud based software application which is able to process bulks and bespoke sets of data and store and return results in a visual format based on a set of configurable and modular query services
Features
- Data processing
- Intelligent data analytics
- Data visualisation
- Data enrichment
- Custom enrichment
- Data graphing
- Data analytics
- Intelligence analysis
- Data fusion
- Real time alerting
Benefits
- Efficient and user friendly data visualisation
- Cost effective solutions
- Understanding trends in your data
- Rapid analysis
- Modern tooling
Pricing
£0 an instance
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
8 4 3 8 2 0 7 8 8 4 8 4 3 9 3
Contact
HAMILTONIAN DYNAMICS LTD
Rob Diamond
Telephone: 07966900679
Email: directors@hamiltoniandynamics.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- Service will need customer engagement to ensure their requirements are met
- System requirements
- Buyers have compatible data policies in place
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
9-5 weekday support
Weekend support on prior arrangement - User can manage status and priority of support tickets
- No
- Phone support
- No
- Web chat support
- No
- Onsite support
- Onsite support
- Support levels
- Support is provided via email on a 9-5 basis, phone support can be arranged if required
- Support available to third parties
- No
Onboarding and offboarding
- Getting started
-
On hands training can be provided
User documentation will be available for the main features and workflows - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
-
Data and enrichments can be provided via storage device (if large) or end product reports can be exported as an when required.
Will comply with all relevant UK Laws - End-of-contract process
-
At the end of a contract the services are ceased and all data securely erased after a grace period (unless user required immediate erasure)
If required data or reports can be extracted for supply to the user.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- Description of service interface
- Interfaces can be provided for custom interactions, e.g. new enrichment types or uploading datasets
- Accessibility standards
- None or don’t know
- Description of accessibility
-
Users can provide data to the service via a web browser or a secure file transfer mechnism (e.g. sftp, https)
Users access the web application to perform data analysis and reporting - Accessibility testing
- UI frontend aims to be WCAG 2.1 level AA compliant
- API
- Yes
- What users can and can't do using the API
-
Users can upload and query datasets via an API, these can be customised depending on buyer requirements.
Main interface will be a UI, however complementatary APIs can be provided for reporting and exporting purposes - API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- Other
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
-
Users can select from a range of data enrichments to be performed on the data
New enrichmetns or requirements can also be requested
Scaling
- Independence of resources
- Instances are provisioned separately for each customer
Analytics
- Service usage metrics
- Yes
- Metrics types
-
User login
Amount of data uploads
Types of data enrichments - Reporting types
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- No
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Data can be exported via APIs, image capture / screenshots or pdf exports from the tool
- Data export formats
-
- CSV
- Other
- Other data export formats
- Txt
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- Json
- Xml
- Variety of image formats
- Variety of video formats
- Variety of text formats
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- Other
- Other protection between networks
- Secure connection can be setup via Wireguard or other VPN technology
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Other
- Other protection within supplier network
- Wireguard
Availability and resilience
- Guaranteed availability
-
Availability is dependant on 3rd Party cloud hosting services.
On prem solutions will rely on local support staff - Approach to resilience
-
Resilience is dependant on 3rd Party cloud hosting services.
Additional cross-site resilience can be setup if required - Outage reporting
- Email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- Seller or users can configure accesses for different user groups
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- Security governance and risk management aims to follow NCSC guidelines
- Information security policies and processes
- Information security policies aim to follow NCSC and Cyber Essential guidelines and processes
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- All changes are stored in a configuration management tool and require a ticket for the change which is recorded in a change management tool
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Reporting from 3rd party services on potential threats
Monitoring of active CVEs to software and services
Patches are deployed when required, dependant on severity - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
Auditing and reporting is used to track and identify compromises
Security manager is informed when a potential compromise and manages the process.
Incidents are responded to immediately when detected - Incident management type
- Supplier-defined controls
- Incident management approach
-
Service aims to follow guidelines set by NCSC.
Users can report incidents via email to the security manager.
Incident reports can be provided on conclusion of the event
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Covid-19 recovery
-
Covid-19 recovery
Service can be used to protect UK economy and for fraud detection which may have been taken advantage of during Covid-19 - Wellbeing
-
Wellbeing
Improve health and
wellbeing
Activities that:
- Demonstrate action to support the health and wellbeing, including physical
and mental health, in the contract workforce.
- Influence staff, suppliers, customers and communities through the delivery
of the contract to support health and wellbeing, including physical and mental
health.
Pricing
- Price
- £0 an instance
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- Demonstration of services provided