Analytics and Business Intelligence Service
Concept Analytics’ Business Intelligence (BI) Services enable an organisation to drive insight and value through the deployment of a cloud-based suite of BI deliverables including reports, dashboards, alerts, data discovery and analysis.
Concept Analytics have created several value-add best practices, tools, processes and approaches for the delivery of BI solutions.
Features
- Prove Business Intelligence implementation on the cloud
- Prove the value cloud based BI can bring an organisation
- An outcome driven approach maximising benefits realisation
- Various proven cross industry solutions to draw from
- Vendor neutral approach supporting all major BI technologies
- Can support mobile BI on iOS and Android devices
- Capabilities include QlikView, QlikSense, Tableau, Microsoft PowerBI, Cognos and more
- Cyber Essentials and GDPR certified service
- Readily available dashboards for multiple business areas
- Readily available KPIs with frontend configuration tool
Benefits
- Agile-driven Minimum viable product BI solutions for fast implementations
- Uses the value of evidence based decision making
- Use cases expressed in an easy to follow format
- Leverage learnings from multiple industry sectors to drive insight
- Portable and timely delivery of insights
- Empowerment of critical decision makers
- Helps deliver robust BI business cases
- Answers complex challenges & delivers accelerated value
- We value data security and conform with GDPR
- Proven and repeatable approach to delivering actionable insights
Pricing
£0 to £1,600 a unit a day
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
9 8 4 5 3 8 5 1 4 3 1 3 3 7 2
Contact
CONCEPT ANALYTICS LTD
Peter Lewis
Telephone: 07909511042
Email: peter.lewis@conceptanalytics.co.uk
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- Data Warehouse
- Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
- No constraints
- System requirements
-
- Microsoft SQL Server Licence
- Microsoft PowerBI Licence
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- This will be set out within the agreed SLA with client.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
The Concept Analytics Service Team will act as a single point of contact for the client and account manager will be appointed for the client.
Our Service Team will monitor Incidents, Service Requests and Problem Management resolution timings. In agreement with the client, Severity Levels will be allocated to Incidents, Service Requests and Problem Records. Concept Analytics are happy to develop more detailed support plan according to client’s needs. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Onsite training using workshops
- Service documentation
- Yes
- Documentation formats
-
- ODF
- End-of-contract data extraction
- N/A
- End-of-contract process
- The service is transitioned to the client
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Chrome
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Windows
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Not applicable
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AAA
- Description of service interface
- Service interface authenticate the user and allows personalised view of the dashboards.
- Accessibility standards
- WCAG 2.1 AAA
- Accessibility testing
- Used JAWS for web accessibility testing
- API
- No
- Customisation available
- Yes
- Description of customisation
- Contact us to discuss your requirements for customisation.
Scaling
- Independence of resources
- Multiple, load-balanced, data centres
Analytics
- Service usage metrics
- Yes
- Metrics types
-
CPU
Disk
HTTP request and response status
Memory
Network - Reporting types
-
- Real-time dashboards
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Using frontend menu of the service.
- Data export formats
-
- CSV
- ODF
- Data import formats
-
- CSV
- ODF
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- All services will be 99.99% available Full details on application
- Approach to resilience
- Resilient By Design
- Outage reporting
- Service Outages are notified by email
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Access restrictions in management interfaces and support channels
- Details on request
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- CSA CCM version 3.0
- ISO/IEC 27001
- Information security policies and processes
- Details on request
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Standard devops three tier methodology (Dev, UAT, Prod)
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- Identify, Evaluate, Treat, Report
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- Access Monitoring / Logging
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Details on request
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Tackling economic inequality
- Equal opportunity
Fighting climate change
Our policy is to reduce travel where possible and utilise public transport where travel is required.We have also adopted and utilised digital technology to facilitate online meetings and the delivery of training and customer workshops.
We undertake regular supply chain monitoring to ensure that biodegradable materials are used in any items sourced, we undertake equipment recycling within the office and also request our staff to categorise waste material to help reduce the amount of landfillTackling economic inequality
We respect the dignity and diverse characteristics of everyone who works for us, both within our workforce and in our supply chains. And we have always been firmly committed to operating to the highest standards of corporate citizenship, acting as a good and supportive neighbour to the communities around us, while recognising our wider obligations to society as a whole.
We also have a local sourcing and recruitment strategy.Equal opportunity
Diversity, equality and inclusion is a key part of our organisational culture and the range of different skills and perspectives can help make our business more competitive. We have always strived to create a diverse and inclusive workforce in which everyone’s dignity is respected, and where our people are valued regardless of their ethnicity or race, religion, gender, age, nationality, sexual orientation, disability or socioeconomic background.
Pricing
- Price
- £0 to £1,600 a unit a day
- Discount for educational organisations
- No
- Free trial available
- No