Skip to main content

Help us improve the Digital Marketplace - send your feedback

Edge Health Ltd

Edge Health Data Analytics and Software Hub (DASH)

Edge Data Analytics and Software Hub (DASH) is our cloud-powered solution that can be tailored to requirements. Our DASH can be built bespoke for as variety of use cases ranging from data ingestion, curation and storage, to interactive dashboards with predictive and prescriptive analytics solutions.

Features

  • Support platform for data analytics
  • Automated data pipelines to regularly ingest analytics data and refresh
  • Interactive dashboards to allow you to explore the modelling
  • Output options: PowerPoint, PDF, Excel, and Power BI for versatility.
  • Compatible with PySpark, Spark, Hadoop, and other data platforms.
  • Real-time metrics trackers and alerts
  • Federated Data Platform
  • Includes data collection, cleaning, and metadata development

Benefits

  • Trend analysis to identify patterns of constrained resources
  • Live reporting of capacity metrics, such as utilisation
  • Tailored models to predict pressuers on your system
  • Data collection, cleaning and metadata development
  • Stakeholder engagement

Pricing

£55,000 to £110,000 a unit

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at george@edgehealth.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

9 5 0 0 8 7 1 7 6 5 9 3 3 1 3

Contact

Edge Health Ltd George Batchelor
Telephone: 07980804956
Email: george@edgehealth.co.uk

Service scope

Software add-on or extension
No
Cloud deployment model
Private cloud
Service constraints
Service Level Agreements (SLAs): Buyers will agree SLAs regarding uptime, performance, and response times with Edge Health. Any deviations from these SLAs should be communicated transparently, and remedies should be provided promptly in case of service disruptions. Planned Maintenance Arrangements: Buyers will be made aware of any planned maintenance schedules that may temporarily disrupt service availability. Edge Health will communicate these maintenance windows in advance to minimize inconvenience for users. Data Ownership and Access Control: need to define data access control, who has access to what data, and how data ownership will be handled in case of contract termination.
System requirements
  • Web Browser compatibility: Microsoft Edge , Safari, Firefox
  • Stable network connection required for seamless access and data transfer.
  • Security compliance with encryption standards for user data privacy.

User support

Email or online ticketing support
Email or online ticketing
Support response times
Response time within 1 day
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Yes, at an extra cost
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
Developed in line with agreed client specification
Web chat accessibility testing
Developed in line with agreed client specification
Onsite support
Yes, at extra cost
Support levels
Edge Health will provide support for previously built DASH solutions. This will include support with training and onboarding new staff, carrying out required maintenance to keep services running and 9-5, Monday-Friday support for any queries you may have. The solution will be maintained to pre-agreed standards (i.e. uptime percentages)
Support available to third parties
Yes

Onboarding and offboarding

Getting started
To assist users in getting started with the DASH platform, we provide a variety of resources tailored to their needs and preferences:

1. User Documentation: We provide detailed user documentation, including manuals, guides, and FAQs, accessible both online and for download. This documentation offers step-by-step instructions, troubleshooting tips, and best practices to help users navigate our service effectively.
2. Live Webinars and Workshops: We conduct live webinars and workshops led by our experts to provide interactive learning experiences. These sessions cover various topics, including getting started with the service, advanced techniques, and industry-specific use cases.
3. Onsite Training (Optional): For organizations seeking personalized training for their teams, we offer onsite training sessions. Our experienced trainers visit your location to deliver customized training programs tailored to your specific requirements and objectives.
Dedicated Customer Support: Our customer support team is available to assist users with any questions or issues they may encounter. Users can reach out via email, phone, or live chat for prompt assistance from knowledgeable support agents.
Service documentation
Yes
Documentation formats
  • ODF
  • PDF
End-of-contract data extraction
We proactively communicate with users as their contract expiration approaches, reminding them of the need to extract their data and providing guidance on the extraction process. This ensures users have ample time to complete the necessary steps before their access to the platform is terminated.

In cases where users require additional assistance with data extraction or migration, our support team is available to provide guidance and support. We offer personalized assistance to help users navigate the data export process successfully and address any challenges they may encounter.

We adhere to a transparent data retention policy, clearly outlining the duration for which user data will be retained after the contract ends. This gives users peace of mind knowing their data will be available for extraction within a specified timeframe following the termination of their contract.
End-of-contract process
As the end of the contract approaches, we notify users in advance to remind them of the upcoming expiration date. This notification includes information on the steps they need to take to prepare for the end of the contract, including data extraction and account closure procedures.

We offer comprehensive data export support that extracts user's data in a format that is compatible with their needs. Our support team is available to assist users with any questions or issues.

Once users have successfully extracted their data, we initiate the account closure process. This involves deactivating the user's account and removing their access to the platform and any associated services or features.

Regarding pricing and additional costs:

The price of the contract typically includes access to our core platform features and services as outlined in the service agreement. This includes basic support services, regular software updates, and access to user documentation and training resources.

Certain optional features or services may incur additional costs beyond the base contract price. Any additional costs are clearly communicated to users upfront and detailed in the contract terms and pricing structure.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
No
Designed for use on mobile devices
No
Service interface
No
User support accessibility
None or don’t know
API
No
Customisation available
Yes
Description of customisation
Edge Health DASH is a fully customisable cloud-powered solution that can be tailored to requirements. DASH can be built for a range of problems and use cases ranging from dashboards to predictive and prescriptive analytics solutions. For example, machine learning to accurately predict cancer patients at risk of breaching waiting times.
Four levels of intensity are available:
1. Level 1 (low intensity) - static cloud powered analytics solutions to visualise and describe your data
2. Level 2 - static cloud powered analytics solutions to make predictions based on your data as well as regular visualisation and descriptive analytics
3. Level 3 - Regularly refreshed cloud powered predictive analytics and live or near live visualisation and descriptive analytics
4. Level 4 (high intensity) - Live or near live cloud powered predictive analytics solutions
5. Maintenance, hosting, and support

Scaling

Independence of resources
To ensure users aren't impacted by demand fluctuations in our DASH, we utilize scalable architecture, resource isolation, load balancing, and proactive monitoring. Azure's auto-scaling adjusts resources based on demand. We maintain strict isolation between user environments. Load balancing evenly distributes requests. Continuous monitoring allows us to address performance issues promptly. Additionally, redundancy and failover mechanisms ensure high availability. These strategies guarantee consistent, reliable service regardless of demand.

Analytics

Service usage metrics
Yes
Metrics types
Through your cloud account, we can track insights of users activity, including login frequency, session duration, and feature usage, to understand how clients interact with our platform and identify opportunities for user training or feature adoption.
We alson monitor data access metrics, and offer cost management metrics.
Reporting types
Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Staff screening not performed
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
Never
Protecting data at rest
Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
To export their data through our platform, users navigate to the data export feature within their account settings or a designated section of the platform.

Users can select the desired export format for their data. Any outputs are available in several formats including but not limited to .CSV, ODF, Excel, and JSON.

Additionally, our support team is available to assist users throughout the export process, providing guidance, troubleshooting assistance, and answering any questions users may have.
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats
  • Excel
  • JSON
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
We commit to maintaining a minimum level of uptime for our services, typically exceeding 99.9%. This ensures that users can access our platform and services reliably and consistently.

In the event that our services experience unplanned downtime or service interruptions, our SLAs specify the maximum allowable downtime within a given time period (e.g., monthly or annually).

If we fail to meet the guaranteed levels of availability outlined in our SLAs, users may be eligible for refunds or service credits as compensation. The specific terms and conditions for refunds or service credits are detailed in the SLAs, including eligibility criteria, refund amounts, and the process for submitting refund requests.
Approach to resilience
We continuously monitor the health and performance of our systems using advanced monitoring tools and techniques. This proactive monitoring allows us to detect and address potential issues before they escalate into service disruptions, ensuring high availability and reliability.

Upon customer's request, we can perform regular backups of their data to ensure data integrity and availability. These backups can be stored on customer's specified locations to mitigate the risk of data loss due to hardware failures, cyber attacks, or other unforeseen events.
Outage reporting
On the customer's request, we can set email alerts to report service outages.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
We implement role-based access control to assign specific roles and permissions to users based on their responsibilities. This ensures that users only have access to the management interfaces and support channels necessary for their role.

We enforce MFA for accessing management interfaces and support channels, adding an extra layer of security beyond passwords.

We maintain detailed audit logs of all access attempts to management interfaces and support channels.

All communication with management interfaces and support channels is encrypted using secure protocols such as HTTPS or SSH, ensuring confidentiality and integrity of data transmitted between users and the system.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
Peers Quality Assurance Limited
ISO/IEC 27001 accreditation date
29/01/2024
What the ISO/IEC 27001 doesn’t cover
Certificate initially issued on 12/01/2018
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
Yes
Any other security certifications
ISO 9001:2015

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
We adhere to ISO/IEC 27001 security policies and processes to safeguard data and mitigate risks effectively. Our policies cover areas such as access control, data encryption, incident response, and regulatory compliance.

To ensure policy adherence, we conduct regular audits, assessments, and training programs for all employees. Access controls are enforced through role-based permissions and multi-factor authentication. Data encryption protocols are implemented across all storage and transmission channels.

Incident response procedures are documented and tested regularly to ensure swift and effective response to security incidents. Regular security awareness training educates employees about policies and best practices.

Continuous monitoring and logging mechanisms track system activities for suspicious behaviour. Compliance assessments and external audits validate adherence to industry standards and regulatory requirements.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Proposed changes undergo a formal change request submission process. This includes providing detailed information about the change, its scope, and its potential impact on the service.

Changes are assessed for potential security impacts by our change management team. This assessment considers factors such as the sensitivity of affected systems, data, and potential risks associated with the change.

Changes must receive approval from relevant stakeholders, including security, operations, users and administrators, before implementation.

Changes undergo rigorous testing in a controlled environment to verify functionality and security. Once tested, changes are implemented following established procedures to minimize disruption and ensure security.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Our vulnerability management process involves continuous monitoring for threats from various sources.

Information sources include security advisories, vulnerability databases, threat intelligence feeds, and security research publications.

We maintain a rigorous patch management process, testing in a TEST environment all patches before deployment and productionisation to ensure minimal disruption. By staying proactive, we protect our systems and services against emerging threats, ensuring the security and integrity of our infrastructure.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Our organization complies with protective monitoring processes, including continuous monitoring, log management, intrusion detection/prevention, anomaly detection, and incident response.

We leverage threat intelligence and SIEM systems to detect and respond to security incidents promptly. These measures enhance our ability to identify and mitigate threats, ensuring the security and integrity of our systems and data.
Incident management type
Supplier-defined controls
Incident management approach
Users report incidents through dedicated channels, including a designated email address or directly to our support team. Upon receiving a report, our incident response team promptly investigates and mitigates the incident according to predefined procedures. After resolution, incident reports are provided to affected users through secure communication channels, detailing the nature of the incident, its impact, and any remedial actions taken. This transparent approach ensures timely incident resolution and fosters trust with our users.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Tackling economic inequality
  • Equal opportunity

Tackling economic inequality

Our approach will ensure opportunities for the development of key employment and skills issues in data engineering, health economics and digital analysis sector.
We directly add social value through recruiting drives annually for entry-level analyst positions focussed on data engineering, health economics and digital analysis sector. We have already implemented robust processes to ensure a level playing field for all candidates, and pride ourselves on equality, diversity and inclusion (EDI) principles in recruitment.
Our recruitment practices prioritise inclusivity, and we promote job postings on a range of widely accessible platforms of educational organisations and social media platforms. Our approach is designed to appeal to a wide range of candidates. Selection tasks are marked without identifiable information to minimise unconscious biases. Additionally, we provide comprehensive support throughout the recruitment process, offering resources and accommodations to ensure that all candidates have an equal opportunity to showcase their skills and experiences, including reasonable adjustments and covering transportation costs to appeal to all demographics.

Our company values have set our working conditions to align with the Good Work Plan. We are a certified Living Wage Employer, publish salaries to ensure transparency on all positions, review salaries yearly updating them with inflation and market rates and we have an objective, evidence-led appraisal and promotion process which is open to everyone in the company.
By fostering a culture of inclusion and actively seeking out diverse perspectives, we believe we can reduce the skills gap in our sector, reduce inequalities in access to jobs, and better serve our clients.

Equal opportunity

Our approach will target high-impact educational attainment outcomes to address skills gaps in data engineering, health economics and digital analysis sector.
We regularly provide education talks and undertake networking activities that boost skills attainment in the high-growth sector of healthcare modelling, and promote awareness of digital analytics-focussed career pathways in the health sector and more broadly.
We also regularly attend and deliver educational talks relating to our healthcare economics and evaluation work, including talks at NHS-R Conference, EARL, and the Association of Chief Children’s Nurses (ACCN).

Training and continual development is at the centre of our focus, with position-tailored mentorship and training schemes which help maintain our average turnover rate under 10%. Every year, every member of the team can use 2x training days every quarter, leading to the attainment of a range of recognised qualifications from online courses in health economics, data science and mathematical modelling, and digital analysis.

Sponsorship of Young Statistician’ Meeting (YSM) 2024
is an example of how we promote awareness of the real-world impact that careers in data engineering, health economics and mathematical modelling can have.

100+ attendees of YSM 2024 at a wide range of career stages (students and early-career statisticians) can benefit from exposure and training from an in-depth case study and the skills and career pathway required to contribute to a dynamic microsimulation model.

We expect the plenary talk will deliver 100+ people-hours of learning interventions primarily for the Midlands region (conference hosted in Birmingham). The networking and poster session will deliver an estimated 50 people-hours of learning interventions.

We have a named lead, George Batchelor, with board-level responsibility, who is the primary point-of-contact on the contract, and who holds the ultimate responsibility for ensuring that this initiative is carried out.

Pricing

Price
£55,000 to £110,000 a unit
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at george@edgehealth.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.