Power BI - Business Intelligence
Power BI is a collection of Business Intelligence solutions from Microsoft. Power BI allows non developers to easily connect to data, build reports and dashboards.
Bridgeall is a leading provider of Power BI development & consultancy. From consultancy, governance, migration, training, implementation and support.
Features
- Build interactive reports and dashboards with Power BI
- Power BI uses a simple drag and drop editor
- Power BI provides a full range of security capability
- Modernise reporting processes with Power BI
- Embedded AI for powerful in-app intelligence via Power BI
- Wide range of charts and visualisations available in Power BI
- Power BI provides the ability to build data models
- Power BI is a market leading Business Intelligence platform
- Power BI comes with 100s of available connectors
- Free Power BI Desktop offering available
Benefits
- Gartner names Microsoft Power BI leader for Business Intelligence
- Reduce reporting time significantly with Power BI
- Connect to your data wherever it lives with Power BI
- Drive productivity and make real time informed decisions
- Increased reporting agility with Microsoft Power BI
- Make better data driven decisions with Power BI
- Leading Microsoft Gold Partner with strong Public sector experience
Pricing
£450 to £1,200 a unit a day
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
9 1 4 2 8 8 7 6 1 3 0 7 8 2 1
Contact
Bridgeall Limited
Andrew Hart
Telephone: 01412126400
Email: tenders@bridgeall.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- Our Power BI consultancy services have no known constraints.
- System requirements
- Power BI constraints can be found here https://products.office.com/en-GB/office-system-requirements
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Within 15 mins
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AAA
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 AAA
- Web chat accessibility testing
- Microsoft Teams & Skype have been developed to meet accessibility standards.
- Onsite support
- Yes, at extra cost
- Support levels
-
Azure services are available 24 x 7
99.9% availability
Our SLA’s can be tailored and agreed to customer requirements, and flexed on a daily bases, as business requirements dictate - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Power BI onboarding is tailored to customer’s requirements
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- Tailored to customer’s requirements
- End-of-contract process
- Tailored to customer’s requirements
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Linux or Unix
- MacOS
- Windows
- Windows Phone
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Power BI has a dedicated mobile app and Power BI desktop offering comparable level of capability. Power BI is also available via the browser.
- Service interface
- No
- User support accessibility
- WCAG 2.1 A
- API
- Yes
- What users can and can't do using the API
- Power BI has a wide range of API capability and out of the box connectors. The full API details are avilable online at dev.office.com
- API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Power BI is a completely customisable solution but full details of the customisation approach from Microsoft can be found here https://technet.microsoft.com/en-us/office/dn788774.aspx
Scaling
- Independence of resources
- Power BI is backed by Microsoft's Investment and SLA's
Analytics
- Service usage metrics
- Yes
- Metrics types
- Office 365 reporting
- Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Microsoft Cloud Services, Consultancy and our own Software IPR
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Please see https://products.office.com/en-us/business/office-365-online-data-portability
- Data export formats
-
- CSV
- ODF
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Bonded fibre optic connections
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- Microsoft provides a 99.9% SLA on Microsoft Power BI https://azure.microsoft.com/en-gb/support/legal/sla/
- Approach to resilience
-
Failover Data Centres - 3 across the UK.
https://docs.microsoft.com/en-gb/Office365/securitycompliance/office-365-data-resiliency-overview - Outage reporting
-
Public dashboard, API, email alerts, SMS
Via the service status portal
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- Active Directory Services and Azure AD Connect
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- QEC
- ISO/IEC 27001 accreditation date
- 10 May 2021
- What the ISO/IEC 27001 doesn’t cover
- NA
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
-
- Cyber Essentials
- Subject to the Return on Investement model ROI
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- CSA CCM version 3.0
- ISO/IEC 27001
- Information security policies and processes
- ISO27001 and Cyber Security
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
The CMDB data is maintained by leveraging the request and change management processes, dedicated modules in the Service Desk suite, which are fully integrated into the CMDB. There is a dedicated change management module within the Bridgeall Service Desk, integrated with the configuration, knowledge base, incident and service request modules. The process provides the following core activities through the ITILV3 Service Desk:
• Initiate change request
• Validate change request including security
• Assess and plan change (operational)
• Approve change implementation
• Execute and complete change
• Status reporting
• Review post implementation and close change. - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
Follow the ITIL process for Vulnerability Management processes, as well as applying our Quality ISO9001 and Security ISO27001 processes. Bridgeall will coordinate and perform regular IT health checks and audits, that provide the interface for vulnerability management. The process shall provide the following core activities:
• Preparation
• Vulnerability scan
• Define remediating actions
• Implement remediating actions
• Rescan
We utilise several proprietary tools provided by Nessus, Qualys and Verisign and work with CREST approved NCC Group. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
Environments are monitored extensively for both the application and infrastructure covering system availability, performance and automated system jobs.
Automatic monitoring is conducted at regular intervals depending. Alerts are raised by email with customisable multi-user notification escalations available.
Critical Alerts
• Ping/Port Availability Checks
• HTTP on all sites
• SMTP Service Check
• Database Service Check
• URL Availability Check
Trend Alerts
• CPU Usage
• Memory Usage
• Storage Capacity
• Disk I/O
• Disk Read/Write Times
URL Response/Wait Times - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
Our ITIL V3 Service Desk manages incidents and escalations until resolution. The Service Desk acts as the end user single point of contact for incident restoration, including requests for information and issues. The Service Desk monitors outstanding trouble tickets or records until they are resolved.
We provide the following activities:
Detection and recording
Classification and initial support
Investigation and diagnosis
Resolution and recovery
Tracking and communication.
Major Incident Process:
Follow procedures
Communication
Defines incident severities,
Escalations
Roles and responsibilities - internal and external organisations
Review process and issue a report - actions taken, lessons learned.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
-
- Public Services Network (PSN)
- NHS Network (N3)
- Scottish Wide Area Network (SWAN)
- Health and Social Care Network (HSCN)
Social Value
- Fighting climate change
-
Fighting climate change
We are committed to monitoring and reducing the impact our business activities have on the environment as follows:
• Reducing energy use relating to our business premises and business travel.
• Switch off all lights, monitors, printers, and any other electrical equipment when not in use
• Re-use and recycling of materials.
• Recycle all waste materials where possible (paper, printer cartridges, packaging)
• Respecting all existing, applicable environmental regulations and meeting all new regulations as soon as is reasonably practicable.
• Taking environmental factors into account when purchasing products and services.
• Complying with the ISO 14001:2004 standard for environmental management systems.
Bridgeall is committed to our responsibilities in doing our part to assist in tackling the global climate emergency. As a business we introduced a policy to support home working for all staff. On average our staff now spend no more than 2 days per week in our Glasgow office (previously 5 days per week) and are encouraged to work from home, which reduces our business travelling/commuting impact by 60% (pre-covid). We actively encourage public transport for all staff when visiting client sites to reduce our carbon footprints. - Tackling economic inequality
-
Tackling economic inequality
As an accredited Living Wage Employer, Bridgeall is proud to support the Living Wage movement. We believe that employers who pay a fair wage will not only attract and retain the best people but will also see improved staff morale and increased productivity.
Furthermore, we do not condone or support Exploitative Employment Practices (Zero Hours Contracts) in any way and our staff work Monday to Friday, between the hours of 8 and 6, 7.5 hours a day. Some staff at their own discretion work overtime and are compensated accordingly both financially and time off in lieu, when required to meet customer deadlines. - Equal opportunity
-
Equal opportunity
It is Bridgeall’s policy to treat all job applicants and employees fairly and equally, regardless of sex, pregnancy, trans-gender status, sexual orientation, religion or belief, marital status, civil partnership status, age or perceived age, race, colour, nationality, national or ethnic origins or disability.
Furthermore, we monitor the composition of the workforce to ensure that our equal opportunities and diversity policy is effective. All our employees are aware of the importance which the Company attaches to its Equal Opportunities Policy, and must ensure that they do not, by their own actions, behavior, or attitudes, directly or indirectly or unintentionally discriminate against any job applicants, employees, customers or clients.
Any act of discrimination will be treated as a disciplinary offence; these will include for example, discrimination in selecting, promoting, or training, refusing to work with or for a person because of any of the reasons stated in paragraph one of this policy and harassment of any employee, customer, or client. Through the application of this policy Bridgeall does all it can to promote good practice in this area to eliminate discrimination and harassment as far as is reasonably possible. - Wellbeing
-
Wellbeing
We support the wellbeing of our employees as a key objective. We provide our employees a great benefit scheme including private health care for all employees and the cycle to work scheme.
We have provided a range of training and support for line managers to deal with mental health issues and carried out sessions across the business.
We promote and support a range of mental health initiatives such as mental health week, stress awareness month and Time to talk day.
Pricing
- Price
- £450 to £1,200 a unit a day
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- Power Platform PoC
- Link to free trial
- TBA