Skip to main content

Help us improve the Digital Marketplace - send your feedback

NEO TECHNOLOGY LIMITED

Neo Technology Data Warehouse Solutions

Neo Technology's Data Warehouse as a Service offers organisations a centralised repository for integrating data from various source systems. Developed by Concept Analytics, it ensures a single version of truth and facilitates centralised reporting. Additionally, it allows the flexible addition and deactivation of data feeds from source systems.

Features

  • Integration of data from multiple source systems
  • Centralised reporting repository
  • Single version of truth for data consistency
  • Scalable architecture for growing data volumes
  • Data feed management for flexibility
  • Automated data processing and transformation
  • Advanced data security and access controls
  • Real-time data updates and synchronisation
  • Customisable data modeling and schema design
  • Analytics and business intelligence integration.

Benefits

  • Improved Data Integration and Consistency
  • Enhanced Decision-making with Centralised Reporting
  • Scalability to Accommodate Growing Data Needs
  • Flexibility in Managing Data Feeds
  • Streamlined Data Processing and Transformation
  • Heightened Data Security and Compliance
  • Timely Access to Real-time Data Updates
  • Tailored Data Models for Specific Business Needs
  • Seamless Integration with Analytics Tools
  • Increased Efficiency and Productivity in Data Management

Pricing

£2 a user a month

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at stuart.payne@neotechnologysolutions.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

9 7 1 7 3 0 6 5 9 5 6 3 6 0 7

Contact

NEO TECHNOLOGY LIMITED Stuart Payne
Telephone: +447719169415
Email: stuart.payne@neotechnologysolutions.com

Service scope

Service constraints
Neo Technology's Data Warehouse as a Service offers numerous benefits, there are some constraints to consider. These may include potential latency issues during data integration from various source systems, limitations on data processing speed based on system resources, and dependency on reliable internet connectivity for accessing and managing the data warehouse. Additionally, clients should ensure compatibility with supported data formats and adhere to data governance policies to maintain data quality and integrity.
System requirements
  • Sufficient storage capacity for large data volumes
  • High-speed internet connection for data transfer
  • Compatible web browsers or client applications for access
  • Adequate processing power and memory resources
  • Compliance with data security and privacy regulations
  • Integration with existing data sources and applications
  • Backup and disaster recovery mechanisms for data integrity
  • Monitoring and alerting systems for performance and security
  • Regular software updates and patches for system stability
  • Staff training and documentation for platform administration.

User support

Email or online ticketing support
Email or online ticketing
Support response times
We offer both email and online ticketing support to ensure comprehensive assistance for our users. Our email support allows users to reach out with inquiries, issues, or feedback directly via email, providing a convenient communication channel. Additionally, our online ticketing system enables users to submit support requests and track their status efficiently. With our ticketing system, users can log their issues, receive timely updates on their resolution progress, and communicate with our support team seamlessly.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AAA
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
Web chat
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
WCAG 2.1 AAA
Web chat accessibility testing
We offer web chat support for quick help. We've tested it to ensure it works well with tools like screen readers. We want everyone, including people with disabilities, to use our chat easily and get the help they need.
Onsite support
No
Support levels
On call support can be provided 24hrs, seven days a week, as required and agreed with the client. All clients have resources, based on support framework required.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We offer a variety of resources to assist users in getting started with our service. This includes comprehensive user documentation available online, covering all aspects of setup, configuration, and usage. Additionally, we provide online training sessions and tutorials for users to familiarise themselves with the platform at their own pace. For those who require further assistance, we offer onsite training sessions conducted by our expert team to ensure a smooth transition and effective utilisation of the service.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
  • Other
Other documentation formats
Word Document
End-of-contract data extraction
At the end of the contract, users can extract their data through a streamlined process facilitated by our platform. We provide tools and mechanisms within the system that allow users to export their data in standard formats such as CSV or Excel. Additionally, users have the option to request assistance from our support team for data extraction, ensuring a smooth transition and compliance with data privacy regulations.
End-of-contract process
At the end of the contract, several processes are initiated. Firstly, there's a review of the services rendered during the contract period, ensuring all deliverables are met. Depending on the agreement, there may be discussions regarding contract renewal or termination. Regarding pricing, the contract typically includes core services specified in the agreement. Additional costs may apply for extra features, customisations, or services beyond the scope of the standard package. This is clarified in the contract terms and can be discussed with the account manager.

Using the service

Web browser interface
Yes
Using the web interface
Our service offers a user-friendly web interface for easy management. Through the web interface, users can perform various tasks, including setting up the service by configuring virtual machines, storage, and networking components. Users can also make changes to their configurations, such as adjusting resource allocations, adding or removing virtual machines, and configuring network settings. However, there may be limitations on advanced configurations or administrative tasks, which might require access to the command-line interface or API for full control and customisation.
Web interface accessibility standard
WCAG 2.1 AAA
Web interface accessibility testing
Our web interface has undergone comprehensive testing with assistive technology users to ensure accessibility for all.
API
No
Command line interface
Yes
Command line interface compatibility
  • Linux or Unix
  • Windows
  • MacOS
Using the command line interface
Our service offers a command line interface (CLI) for users who prefer text-based interactions. Through the CLI, users can perform various tasks such as deploying and configuring resources, managing permissions, and monitoring system status. Users can set up the service by running commands to initialise configurations, create resources, and establish connections to external systems. Changes to configurations, settings, or resource allocations can also be made through the CLI by executing appropriate commands. While the CLI provides extensive functionality, some complex configurations or advanced features may require interaction through other interfaces.

Scaling

Scaling available
Yes
Scaling type
  • Automatic
  • Manual
Independence of resources
To ensure independence of resources, we employ robust resource isolation techniques within our infrastructure. Each user's workload is allocated dedicated resources, including compute, storage, and network capacity, preventing resource contention and ensuring consistent performance.

Additionally, we implement dynamic scaling mechanisms to automatically adjust resource allocation based on demand fluctuations, maintaining optimal performance levels even during peak usage periods.

Continuous monitoring and proactive capacity planning further safeguard against resource exhaustion, guaranteeing that users remain unaffected by the demand placed on by others, ensuring a seamless and reliable user experience.
Usage notifications
Yes
Usage reporting
  • API
  • Email
  • SMS
  • Other
Other usage reporting
Telephone and strategic business review meetings.

Analytics

Infrastructure or application metrics
Yes
Metrics types
  • CPU
  • Disk
  • HTTP request and response status
  • Memory
  • Network
  • Number of active instances
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
No
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
In-house
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Backup and recovery

Backup and recovery
Yes
What’s backed up
  • Files: Documents, images, videos, and other digital assets.
  • Virtual machines: Entire virtualised computing environments.
  • Databases: Structured data stored in databases.
  • Applications: Software installations and configurations.
  • System configurations: Operating system settings and preferences.
  • Network configurations: Network settings and firewall rules.
  • Website content: Web pages, scripts, and media files.
  • Server logs: Records of system events and activities.
Backup controls
Users can control backups through our service's management interface. They can specify what data or resources to back up and set up different backup schedules based on their preferences or requirements.
Datacentre setup
  • Multiple datacentres with disaster recovery
  • Multiple datacentres
Scheduling backups
Supplier controls the whole backup schedule
Backup recovery
  • Users can recover backups themselves, for example through a web interface
  • Users contact the support team

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Bonded fibre optic connections
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
We guarantee a high level of availability for our service, typically backed by service level agreements (SLAs) that outline specific uptime targets. These SLAs often specify the percentage of time the service is expected to be available within a given period, such as 99.9% uptime annually. In the event that we fail to meet these guaranteed levels of availability, users may be entitled to refunds or credits, depending on the terms outlined in the SLA. Our goal is to ensure that users experience minimal disruptions and can rely on our service to meet their needs consistently.
Approach to resilience
Available on request.
Outage reporting
We'll ensure you're promptly notified of any service outages via email. For enhanced monitoring, we also offer real-time dashboards, providing immediate visibility into service status. Additionally, we provide access to APIs, allowing seamless integration with your systems for outage reporting.

Identity and authentication

User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
We enforce strict access controls to ensure that only authorised personnel can access management interfaces and support channels. This includes implementing role-based access control (RBAC) to limit permissions based on user roles and responsibilities. Additionally, we utilise strong authentication mechanisms such as multi-factor authentication (MFA) to verify the identity of users before granting access. Access to sensitive data and administrative functions is further restricted through network segmentation and encryption protocols. Regular audits and monitoring are conducted to detect and address any unauthorised access attempts promptly.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Devices users manage the service through
  • Dedicated device on a segregated network (providers own provision)
  • Dedicated device on a government network (for example PSN)
  • Dedicated device over multiple services or networks
  • Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)
  • Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Access to user activity audit information
You control when users can access audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
You control when users can access audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
Adoptech
ISO/IEC 27001 accreditation date
10/01/2024
What the ISO/IEC 27001 doesn’t cover
Compliance with industry-specific regulations or standards not explicitly covered by ISO/IEC 27001. Security practices of third-party vendors or partners not directly under our control. Aspects of security related to emerging technologies or evolving threats not explicitly addressed in the ISO/IEC 27001 standard. Internal policies and procedures not directly related to information security management.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
We adhere to robust information security policies and processes to safeguard your data. These include measures such as encryption protocols, access controls, regular security audits, and compliance with industry standards like ISO 27001. Additionally, we implement stringent authentication methods, conduct employee training on security best practices, and maintain a proactive approach to identifying and mitigating potential security risks.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
We closely track all parts of our services from the moment they're created until they're no longer needed. When we make any changes, we carefully check them to see if they might cause security issues. We test everything thoroughly before making the changes to ensure they won't cause any problems. We follow the best practices in the industry and use systems to keep track of different versions of our services, so everything stays organised and secure.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
We regularly assess our services to identify any potential weaknesses or threats. Once identified, we swiftly deploy patches or fixes to address these vulnerabilities. We stay informed about potential threats from various sources, including security advisories, industry forums, and threat intelligence feeds. Our goal is to proactively address any vulnerabilities to ensure the security and integrity of our services
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Our protective monitoring processes involve continuous monitoring of our systems and networks to detect any potential security breaches or compromises. When a potential compromise is identified, we have established protocols to promptly investigate the incident and take necessary actions to mitigate the threat. Our goal is to respond swiftly and meet agreed SLAs to any incidents to minimise the impact and protect the integrity of our services and data.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Users can report incidents through designated channels, such as our support portal or email. Upon receiving a report, our team investigates the incident promptly and communicates updates to users as necessary. After resolving the incident, we provide detailed incident reports outlining the cause, impact, and actions taken to prevent recurrence, ensuring transparency and accountability in our incident management approach.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
Yes
Who implements virtualisation
Supplier
Virtualisation technologies used
VMware
How shared infrastructure is kept separate
We utilise virtualisation technology to ensure the separation of applications and users sharing the same infrastructure.

Different organisations are kept apart through robust virtualisation techniques such as hypervisor-based isolation, network segmentation, and resource allocation policies.

Each organisation's resources are logically isolated and dedicated to them, preventing interference or access from other entities sharing the same underlying infrastructure.

Energy efficiency

Energy-efficient datacentres
Yes
Description of energy efficient datacentres
Our data centres adhere to the EU Code of Conduct for Energy Efficient Data Centres, employing various strategies to minimise energy consumption and promote sustainability.

Social Value

Social Value

Social Value

  • Fighting climate change
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

Cloud computing helps fight climate change by using less energy and reducing emissions. It does this by making data centres more efficient, so they use less power. Cloud services also let people work from home more, so there's less pollution from commuting. Overall, cloud computing is making it easier for everyone to help the planet.

Tackling economic inequality

We prioritise initiatives that promote economic inclusivity, such as providing opportunities for small and local businesses to participate in our supply chain. Additionally, we offer flexible pricing models and discounts to ensure affordability for organisations with limited resources.

Equal opportunity

Our service promotes diversity and equal access to opportunities. We actively engage with underrepresented groups, including minority-owned businesses and marginalised communities, to ensure their voices are heard and their needs are met. Furthermore, our recruitment and training practices prioritise diversity and inclusion.

Wellbeing

We prioritise the wellbeing of our employees, customers, and communities. Our service offerings include features designed to enhance mental health and work-life balance. We also support employee volunteer programs and community initiatives aimed at improving overall wellbeing.

Pricing

Price
£2 a user a month
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at stuart.payne@neotechnologysolutions.com. Tell them what format you need. It will help if you say what assistive technology you use.