Open Banking Account Information Service (Fully Integrated)
DGM Agility is an authorised Account Information Service Provider (AISP) which enables us to provide a gateway to the Open Banking service.
This service enables access to an aggregation of financial information for an individual or business. We collect, store, and make available the information as a service
Features
- Aggregation of Financial information for an individual or business
- access and view multiple sources of account information
- collect, store and make available financial information as a service
- Fully integrated service
- Mobile connected service
- Multiple service support options
- Professional Services
- Secure by Design
- Artificial Intelligence dramatically improving decision making
- Machine Learning meaning better outcomes
Benefits
- Aggregate and analyse large volumes of financial data
- Identify patters, trends and anomalies and behaviours
- Personalised recommendations to an individual
- Enhance fraud detection
- Risk profiling
- Automating and improving end to end processing.
- Aligned to Secure by Design
- Continuous Improvement
Pricing
£200 to £1,200 a unit a year
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
9 9 0 8 5 4 4 5 4 3 5 9 8 5 5
Contact
DGM AGILITY LIMITED
Darren Muizelaar
Telephone: 07538122855
Email: darren.muizelaar@dgmagility.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- DGM Agility is regulated by the Financial Conduct Authority which removes the pain from our customers requiring authorisation for this service. The customer must still adhere to Financial Conduct Authority policy and guidance and must agree to operate to ensure better outcomes.
- System requirements
-
- There is a an annual or monthly subscription fee
- There is a small per transaction fee for large organisations.
- First 20 transactions per month are free.
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Support response times
DGM Agility will respond to tickets within agreed Service Level Agreements (SLAs). Any response times will depend on the urgency and priority classification. Typically: P1 - 15 Minutes P2 - 30 Minutes P3 - 60 Minutes - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Yes, at an extra cost
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web chat accessibility testing
-
We use 3rd party off the shelf solutions
Zendesk uses the Voluntary Product Accessibility Template (VPAT), to publish an Accessibility Conformance Report (ACR), which documents an audit of our systems relative to WCAG 2.1 AA performed by a third party accessibility vendor.
We pay attention to Accessibility throughout our release cycle. This includes:
Following the standards and documentation created by our Product Accessibility team.
Training everyone involved in delivering our products around assistive technology and Accessibility best practices. This includes, designers, engineers, product and program managers, and content writers. At a personal level we try to make sure all Zendesk product and engineering employees think about the humans at the other end of the internet by sharing stories and feedback.
Leveraging Garden, our design system, from early design through development to ensure an accessible foundation for all our products
Testing our products before release using both manual and automated techniques.
Conducting regular research with agents, admins and end users who rely on assistive technology to collect feedback and help us prioritize improvements.
Systematically tracking both remediation and new feature progress to drive quality improvements
Engaging third-party auditors to conduct regular compliance audits of our products.
Listening to feedback from customers. - Onsite support
- Yes, at extra cost
- Support levels
- Our onsite support levels are on a consultancy basis and are charged at the appropriate rate which is detailed within our SIFA Rate Card.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
We provide online documentation along with and integration and testing plan. For a fully integrated service you will need to carryout integration testing and confirm to our code of connection prior to go live.
Training will be provided for staff who will be using the service on a day to day basis. Any development or systems integration work required will be charged in line with our SFIA Rate Card. - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Users will be informed of the data extraction process before contract end. This data extraction will be in a format chosen by the user.
- End-of-contract process
-
Hosting and 9-5 basic support is included in the service, Extended support or out of hours will negotiated during call off as there are varying support packages available. 6 months prior to contract end you must inform us of contract end, DGM will carryout preparations to end the service.
Data will be cleaned from all storage devices before placing back into the resource pool provided by the cloud provider. all applications data, compute will be removed 14 days after contract end.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Chrome
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Although the application will work on a mobile device it is more practical using a full screen for our fully integrated option.
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- Description of service interface
- The service interface is usually required for members to via and analyse the collected data.
- Accessibility standards
- WCAG 2.1 AA or EN 301 549
- Accessibility testing
- We have carried out limited testing
- API
- Yes
- What users can and can't do using the API
- Our fully integrated offering where it integrates wit your website or portal will allow access to all our services. we also have a redirect where the user is redirected to our portal seamlessly.
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Yes the solution can be customised with common logo and custom themes
Scaling
- Independence of resources
- As a SaaS solution we have logical separation between each customer where resource management is constantly monitored. Should the environment require further resource it will automatically scale up when required and scale down when resources are no longer required.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
We record when a user has signed up/in/out
Which records were Crated, updated, read, and deleted
We also provide an aggregation of financial, management information, Artificial Intelligence and Machine Learning data surfaced through our platforms portal which is accessible to all users who have the correct role to review the data. - Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
-
- Physical access control, complying with SSAE-16 / ISAE 3402
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Users can export individual data by downloading the full record in PDF format for staff storage. Alternatively data can be downloaded in CSV format.
- Data export formats
-
- CSV
- Other
- Other data export formats
- PDF for non raw data.
- Data import formats
-
- CSV
- Other
- Other data import formats
- API
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Other
- Other protection between networks
- For data in transit, we use industry-standard secure transport protocols, such as TLS/SSL, between user devices and the Microsoft datacentres. We enable encryption for traffic between your allocated resources. We use the industry-standard IPsec protocol to encrypt traffic between your corporate VPN gateway and our solution should it be required.
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Other
- Other protection within supplier network
- All data in transit and at rest are encrypted with our industry standard PaaS instances provided by the cloud providers platform. Further enhanced security can be applied upon request.
Availability and resilience
- Guaranteed availability
-
With our Open Banking Service we take advantage of the PaaS service and tools provided by the Cloud providers platform making the platform as a whole more cost effective, secure and available.
The platform provides 95.0% uptime per month for a single region. Within the region, marketplace services and products have their own service-level agreements (SLAs). How they are configured will dictate their overall availability within a region. A multi region configuration approach will greatly improve uptime. Should the platform or service provided by the platform supply fail to meet an SLA then a service credit will be issued by the platform provider.
The Open Banking systems and service deployed within the DGM Agility environment will provide an availability of 99.5% per month. Should the service be unavailable and breach the guaranteed availability then a service credit will be issued. - Approach to resilience
-
Our platform is hosted within our 3rd party dedicate cloud platform. All technology layers are logically separated, highly resilient within the same site, there are warm standby services in the second site.
All data held will reside within the UK. As this service will process, store and make available personal financial data further details regarding resilience can be provided upon request. - Outage reporting
-
Via a non public dashboard, email alerts and our on 3rd party monitoring tools. We will send email alerts to the customer should there be service interruption.
The platform provided by the 3rd party cloud platform provider provides a service health dashboard. They also provide provide custom alerts, API, and log data to assist with any service outages.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- We use 2 factor authentication via the MS Azure authentication App or SMS verification. Each user is given a role, this role will be provided the correct level of access to the system based on the role assigned.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- Between 6 months and 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- Between 6 months and 12 months
- How long system logs are stored for
- Between 6 months and 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- CSA CCM version 3.0
- Information security policies and processes
-
"An Information Security Management Program has been established to enable Microsoft Azure to maintain and improve its management system for information security. Through establishment of the ISMS, Azure plans for and manages protection of its assets to acceptable security levels based on defined risk management processes. In addition, Azure monitors the ISMS and the effectiveness of controls in maintaining the confidentiality, integrity and availability of assets to continuously improve information security.
The ISMS framework encompasses industry best-practices for information security and privacy. The ISMS has been documented and communicated in a customer-facing Information Security Policy, which can be made available upon request (customers and prospective customers must have a signed NDA or equivalent in place to receive a copy).
Microsoft Azure performs annual ISMS reviews, the results of which are reviewed by management. This involves monitoring ongoing effectiveness and improvement of the ISMS control environment by reviewing security issues, audit results, and monitoring status, and by planning and tracking necessary corrective actions.
Also see https://www.microsoft.com/en-us/TrustCenter/Compliance/ISO-IEC-27001 and The Microsoft Cloud Security Policy is available via the Service Trust Platform aka.ms/stp"
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
"Azure has developed formal standard operating procedures (SOPs) governing the change management process. These SOPs cover both software development and hardware change and release management, and are consistent with established regulatory guidelines including ISO 27001, SOC 1 / SOC 2, NIST 800-53, and others.
Microsoft also uses Operational Security Assurance (OSA), a framework that incorporates the knowledge gained through a variety of capabilities that are unique to Microsoft including the Microsoft Security Development Lifecycle (SDL), the Microsoft Security Response Center program, and deep awareness of the cybersecurity threat landscape.
Please see https://www.microsoft.com/en-us/SDL/OperationalSecurityAssurance and https://www.microsoft.com/en-us/sdl
" - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
"When providing the Antimalware solution for our platform, Azure is responsible for ensuring the service is highly available, definitions are updated regularly, that configuration through the Azure Management Portal is effective and that the software detects and protects against known types of malicious software. MCIO-managed hosts in the scope boundary are scanned to validate anti-virus clients are installed and current signature-definition files exist.
Vulnerability scans are performed on a quarterly basis at a minimum. Microsoft Azure contracts with independent assessors to perform penetration testing of the Microsoft Azure boundary." - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
"Microsoft Azure employs sophisticated software-defined service instrumentation and monitoring that integrates at the component or server level, the datacenter edge, our network backbone, Internet exchange sites, and at the real or simulated user level, providing visibility when a service disruption is occurring and pinpointing its cause.
Proactive monitoring continuously measures the performance of key subsystems of the Microsoft Azure services platform against the established boundaries for acceptable service performance and availability. When a threshold is reached or an irregular event occurs, the monitoring system generates warnings so that operations staff can address the threshold or event.
" - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
At DGM Agility we have adopted the ITILV4 framework
We facilitate a coordinated response to incidents.
• Identification – System and security alerts may be harvested, correlated, and analysed.
• Containment – Our team evaluates scope and impact of an incident.
• Eradication – The team eradicates any damage caused by the security breach, identifies root cause for why the security issue occurred.
• Recovery – During recovery, software or configuration updates are applied to the system and services are returned to a full working capacity.
• Lessons Learned – Each security incident is analyzed to protect against future reoccurrence."
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Equal opportunity
Fighting climate change
We are committed to sustainability and recognising our responsibility to minimising impact of our operations and services on the environment. We have a fully integrated approach to environmental management, meeting the principles of the Environmental Protection Act 1990, WEEE Directives, Greening Government Commitments and ISO14001.
Our Method Statement comprises two elements confirming our commitment to ensuring that opportunities under contract deliver the Policy Outcome and Model Award Criteria;
(1) Actions our organisation is taking
(2) Activities we’ll undertake to support the contract
(1) Examples demonstrating our commitment to Fighting Climate Change;
• Carbon Reduction Plan target to become NetZero by 2030 and have flagged UN SDG targets 9 and 12 as our priorities.
• Our UK offices are powered by renewable energy
• We have a Climate Positive Workforce with our Carbon emissions offset through our partnership with Ecologi at 10.8 tonnes CO2 per employee/year.
• We Promote Sustainable travel: Our people use sustainable commuting methods through Cycle-to-Work, season ticket loan and secure bike-parking schemes.
• Installing state-of-the-art conferencing facilities realising a significant reduction of office-to-office commuting.
• Reducing waste: We have introduced waste management systems in our offices, minimised single-use water bottles and operate paperless offices.
(2) Activities we’ll undertake to reconnect people with the environment and increasing awareness to protect and enhance it.
We will track and optimise the carbon footprint of the target estate using industry leading Carbon calculators. We’ll promote embedding sustainability as a digital design principle inline with Greening Government Commitments and support awareness of CO2e reduction and best practice.
We will minimise the carbon footprint of our work using technology to work remotely by default.
To enable awareness, and to influence the supply chain and local communities, we will share best practice with the project team, its supply chain and educate the local community.Equal opportunity
There are 14.1 million disabled people in the UK. 19% of working age adults are disabled (Family Resources Survey, 2019 to 20), however, disabled people are twice as likely to be unemployed as non-disabled people.
We recognise the inequalities that have been amplified during the pandemic, in particular to those with disability. As a Disability Confident Employer, we have incorporated Disability awareness training as part of our mandatory training for our UK workforce from April 2022 onwards. We are committed to becoming a Disability Confident Level 2 employer by June 2022.
We are an equal opportunity employer and publish our Diversity and Inclusion Policy. We continuously focus on any barriers that may prevent underrepresented groups from being appointed to a position, especially management positions. All UK Jobs are advertised through an inclusive and accessible job platform via our partnership with Vercida group, a D&I resourcing specialist.
We recognise our role, is to use our expertise to make sure people with disabilities can connect and contribute to the workplace in the best way possible, to ensure they are thriving at work and within their role for the organisation.
Our Inclusive leadership management training plays a vital role in creating and sustaining an inclusive working environment. This ranges from implementing the people management policies that will impact on how a person with a disability experiences work, to managing absence or a flexible working model to support the individual. Our inclusive and accessible development practices support managers to; attract the most suitable talent; be confident about supporting colleagues with a disabilities / health condition through on-boarding, training, and progression; understand how to identify and reduce, through workplace adjustment, the barriers that would prevent someone from reaching their potential; ensure fair treatment for all colleagues and create and inclusive working environment and culture.
Pricing
- Price
- £200 to £1,200 a unit a year
- Discount for educational organisations
- Yes
- Free trial available
- No