Denodo Data Virtualisation Platform
The Denodo Platform extends the value of enterprise data integration through data virtualization with its ability to merge data across any digital source, whether structured, unstructured or semi-structured.
Organizations looking to leverage their information assets can integrate all data sources regardless of structure or location to create new business applications.
Features
- Data Virtualisation
- Data Governance
- Meta Data Management
- Data Fabric/Mesh & Logical Data Structures
- Data Sharing, Integration & Interoperability
- Reference & Master Data Management
- Integration with Other platforms
- Data Audit & Security
- UK hosted private cloud
Benefits
- Real-time access to multiple data source and data types
- Logical view of your data, no transform or loading
- Data queries stay at source
- Unified Governance and security layer
- Improved speed of information delivery to the data consumer
- Change management made easy
- Managed Service removes operational costs and burden
- Single, logical point of access to data
- Support for multiple BI tools for publishing data
- Support for multiple data sources and vendors
Pricing
£10,400 an instance a month
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
9 6 4 8 4 3 3 6 1 1 5 4 1 4 1
Contact
IOCO SOLUTIONS LIMITED
Mick Morey
Telephone: 0118 206 2938
Email: michael.morey@ioco.tech
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
- Weekly 2 hour maintenance is part of agreement - if service affecting then customers will be notified in advance
- System requirements
-
- Modern Web Browser (Edge, Chrome, Firefox, Safari)
- Internet access for users
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Support response times
Severity 1 - 1 Hour,
Severity 2 - 4 hours,
Severity 3 - 8 hours,
Severity 4 - 1 Business Day or as per service catalog - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
The Managed Cloud Service is fully supported by iOCO's24/7 Service Desk providing a single point of access for all incidents and requests. The service is available via telephone, email or iOCO SMAX portal. Responses are prioritised and addressed in line with the service levels detailed in the Service Level Agreement document.
All engagements have a named Service Manager for engagement and escalations with a Technical Service Manager who attend service review meetings. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Onsite or online training is available for the solution and a Getting started full set of documentation is provided with an online Help Center. iOCO would also provide project-based services to help our customers get their Denodo models designed and built for purpose.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- We are providing a platform as a service with Denodo installed and available for use. As Denodo is a data virtualisation tool, no data is stored within our hosted cloud. Backup and restore of the Denodo models would be available for the customer. This would enable the customer to move to another service provider, or install Denodo on-premise.
- End-of-contract process
- Typically Denodo is a subscription-based service which can either be -renewed or terminated. The customer has the right to backup and restore their specific Denodo content and models for future use.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
-
Denodo Design Studio has the ability to make data available in an API format at the click of a button.
Today’s enterprise data ecosystems look different than in the past. In retrospect, the idea of physically consolidating all data into a single location seems quaint. As digital business initiatives focus on exploiting data rather than merely storing it, the growing communities of savvy enterprise users demand connectivity to data assets wherever they exist. Just like how the Web links data from anywhere, data virtualization enables connectivity to data from anywhere through APIs to use and share data for business processes and AI/ML analytic models. - API documentation
- Yes
- API documentation formats
-
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Each Denodo data ecosystem would be unique per customer as the data sources and consumer needs would be unique per organisation. Denodo is a flexible platform that enables our customers to start small and build out a single-view of their data in logical data structures to suite the needs of the business.
Scaling
- Independence of resources
- The iOCO Cloud and Denodo platform is high availability by design with 24x7 monitoring to identify any event driven impacts on end user service whilst allowing on demand scaling of compute resources.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Standard 'Help desk' metrics are provided e.g. No of tickets closed within SLA. Tickets open by agent etc
- Reporting types
-
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Denodo
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Scale, obfuscating techniques, or data storage sharding
- Other
- Other data at rest protection approach
-
Typically Denodo does not keep a copy of the source data, but does store the metadata for each source. The application has been built to vendor requirements, as such there is no OS or DB level encryption beyond user / password access. The application has obfuscated passwords within the databases. There are options available for encryption of data on DB and OS level, though these come with not insignificant performance hits so we would have to consider increasing resource and cost if this was needed e.g.
PostgresSQL - CyberTec Instance Level Encryption
Centos NFS - Encrypted File System - Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Data is not stored within the Denodo platform. Where specific BI tools are being used to access data through Denodo, then these tools would allow the user to export to Excel, PDF or CSV files (e.g. Power BI has these capabilities).
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- XML
- XLS
- Data import formats
-
- CSV
- Other
- Other data import formats
- XML
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
- Other
- Other protection within supplier network
-
Client-to-Site (SSL) VPN connectivity that allows the customer’s administrators to access the private IP addresses of the Workloads through a secure, encrypted tunnel.
Built into the Virtual Cloud Management application. Full network and firewall segregation achieved with Virtualization, Network and security controls.
The application is multi-tenanted. There is a back office management layer where tenants and users are setup. A back office admin user does not by default have access to a tenant. The tenant admin has access to report on any action taken within their own tenant.
Availability and resilience
- Guaranteed availability
- SLA - 99.9% availability. If iOCO service fails to meet this key objective in a given calendar month, 5% of prorated monthly cloud service fee will be refunded directly to the customer account within 30 days.
- Approach to resilience
-
Data Centres have a high resilience setup:
• Highly secure, Tier 4 data centre environment
• Dual power circuits with UPS
• Backup power generators
• Constant environmental monitoring
• Dual network and redundant data fabric
• Software-defined storage services
• Converged and hyper-converged infrastructure
• On-going capacity planning
Application is built upon a containerised architecture. This is able to redeploy services on available hardware if it senses that an issue has occurred. - Outage reporting
- Dependent on customer requirements, outages can be accessed via Public URL, or notified by telephone and/or email alerts.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Username or password
- Other
- Other user authentication
- SAML OATH 2.0 via Customer ADFS server
- Access restrictions in management interfaces and support channels
- The application is multi-tenanted. There is a back office management layer where tenants and users are setup. Application back office administrators are named and limited in number. A back office admin user does not by default have access to a tenant. By adding themselves to a tenant, this account only has very basic permissions to raise new requests and view your own requests only. The tenant admin has access to report on any action taken within their own tenant.
- Access restriction testing frequency
- At least once a year
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- Between 1 month and 6 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
- INFORMATION SECURITY MANAGEMENT SYSTEM ISO/IEC 27001:2013 for the Datacentre
Security governance
- Named board-level person responsible for service security
- No
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Security is managed at three levels: Infrastructure, Environment, Customer. iOCO Cloud team are wholly responsible for Infrastructure security, governing DC / Hardware, Network and Security devices. iOCO Application Management team is responsible for managing the environment where the application is running - for example building and hardening the application to vendor recommendations. Customer is responsible for in-application security.(e.g. user role access) and the security of on-premise components that maybe required for integration purposes.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- The change management processes follow ISO27001 A.12.1.2 controlled mechanism for making changes to operational environments.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
We subscribe to multiple vendor provided vulnerability
notification services. All vulnerabilities are reviewed and applicable patches are administered through the change control process . Mitigation measures will always be considered first, with critical patches targeted for resolution within 30 days. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
Denial of Service is applied on all Internet links , with Intrusion detection\protection available to customers on request. All security events are logged\notified based on severity. Any attempted platform security compromises are dealt with 24/7 by security engineers. The responsibility remains with the customer to ensure detected intrusions are re-mediated where customershavecontrol,permission,oraccesstomodifytheir service. iOCO recommends that customers follow security best practices including, but not limited to:
• Maintaining effective firewall rules
• Limiting the communication ports to only the necessary, for conducting business
• Locking down access - Incident management type
- Supplier-defined controls
- Incident management approach
- The incident response process complies with industry standards for legally admissible chain-of-custody and forensic data collection management processes and controls. Response standards, procedures, and methods are implemented based on the severity level of an incident. Incident reports are produced as part of standard post incident process and provided to customers on request.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
Denodo is used to virtualisation data tool, which enables users to connect various data sources together and not have to physically pull data into a new repository. This reduces carbon emissions and thus contributing to fighting climate change.
Pricing
- Price
- £10,400 an instance a month
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
-
60 day free trial available for 10 concurrent users.
Integrations into the trial may not be supported and could be subject to a cost. This can be discussed with the prospective customer.