Panoramic AI - Business Intelligence
Panoramic AI Business Intelligence helps organisations drive business value from their data through a highly configurable data platform and data visualisation/dashboarding framework. Embedding data analytics and machine learning technology, it provides augmented intelligence and data analysis/interrogation through intuitive no-code user interfaces as well as reporting and alerting capabilities.
Features
- Automated thematic reporting, geographic mapping, trend analysis and dashboards
- Web-based Visualisations beyond the capabilities of off-the-shelf tools
- Customised business applications, processes, workflows and notifications
- Integration and connections with third-party data sources and platforms
- Integration with existing data warehouses and BI tools (including PowerBI)
- ML / data analytics models: time series forecasting, text-analysis/NLP/LLMs
- Geographic mapping, trend analysis and dashboarding of data for reporting
- Intelligent and customisable reporting dashboards with embedded models
- Customisable data models and data views
- Intuitive no-code/low-code UX to visualise data and analyse data
Benefits
- Integrate, analyse, share, gain comprehensive insight on organisational data
- Intuitive visualisation allows users to quickly discover data of interest
- Non-technical guided wizards/interfaces to select data and setup dashboards
- Enables business-wide or department specific analytics
- Automated reporting and visualisations make complex data analytics easier
- Integration of machine learning models allows deeper understanding
- Data driven policy, decision making, and tracking of outcomes
- Successful implementation track record including Tourism, Trade, Water data
- Complex processes embedded in user-friendly workflows and business applications
- Customisable reports/dashboards help visualise large datasets
Pricing
£1,000 to £20,000 a unit a month
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
9 9 0 9 2 3 2 9 9 9 3 9 4 1 2
Contact
Analytics Engines
Scott Fischaber
Telephone: 02890669022
Email: info@analyticsengines.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- Planned maintenance is typically scheduled during Analytics Engines support hours.
- System requirements
- Debian, Ubuntu, or Red Hat OS operating systems
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Response to support emails are typically within 1 working day (normally within 1 hour).
- User can manage status and priority of support tickets
- No
- Phone support
- No
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Analytics Engines provides basic support for the service, from level 1 to level 3 as part of the cost and provide a technical account manager to oversee and manage the engagement.
Enhanced support (out of hours, phone, on-site, additional training) can be provided at additional cost. - Support available to third parties
- No
Onboarding and offboarding
- Getting started
- User documentation is provided and remote onboarding sessions are held with the buyer's team. Onsite training can be provided for additional cost upon request.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- The source data and the results of the Panoramic AI Business Intelligence analytic models can be downloaded in CSV format at any time during the contract.
- End-of-contract process
-
At the end of the contract, the buyer should either renew their license with Analytics Engines or they should terminate usage of the service and export any data that they want from the system.
In the case of deployment within the buyers systems, they should remove the service and provide Analytics Engines with confirmation that the service has been removed.
Where Analytics Engines hosts the service, we will shutdown the service and delete the data.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- A service interface is provided to self-manage users and roles.
- Accessibility standards
- None or don’t know
- Description of accessibility
- The keyboard focus indicator is visible. When any component receives focus, it does not initiate change of context. The pages are titled. The purpose of links can be determined from their text. Headings describe their purpose. Changing the setting of any user interface component does not automatically cause a change of context.
- Accessibility testing
- None
- API
- Yes
- What users can and can't do using the API
- Panoramic AI Business Intelligence provides an API to login, ingest data, retrieve data from the system, and in some cases monitor the status of tasks or models. The API is available once Panoramic AI Business Intelligence is deployed.
- API documentation
- Yes
- API documentation formats
- Open API (also known as Swagger)
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
-
Panoramic AI Business Intelligence provides capability to create, manage and run data and reporting pipelines. The data pipelines perform data ingest, data augmentation, data aggregation and data analytics. They can be customised for the customer’s own data sets. This customisation allows the analytic models to be run against the customer’s own data. The customisation can be done at configuration by the supplier in close collaboration with the buyer.
Panoramic AI Business Intelligence can be used to customise dashboard, reports, alerts, and notifications that are generated.
Scaling
- Independence of resources
- Each customer has their own deployment of Panoramic AI Business Intelligence.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Data can be stored on access to the APIs and status of various tasks provided within the service for administrative and security reasons.
The data can be provided as logs, feed to upstream systems, or aggregated for analysis within dashboards. - Reporting types
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- The Panoramic AI Business Intelligence UI and API provide functionality for users to download data and results of the Panoramic AI Business Intelligence data views and analytic models in CSV format.
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
High-Availability can be provided for additional cost based on customers specific application demands, but target availability better than 95% is expected.
In the event of a business critical fault within Panoramic AI Business Intelligence, Analytics Engines will provide a response from front line support within 1 business day (Normal response time is 1 hour) outlining resolution steps.
Events are expected to be resolved within 2 business days of resolution plan providing at least a workaround to downgrade the criticality.
This SLA covers the Panoramic AI Business Intelligence software solution. This SLA does not cover services provided by the customer that Panoramic AI Business Intelligence utilises (e.g. Cloud/Server infrastructure, API availability, Data Changes, DB access, etc.). This SLA does not cover Incidents caused by User’s negligence, abuse, misapplication or use of the Panoramic AI Business Intelligence service other than as specified in the Panoramic AI Business Intelligence Service Description or other causes beyond the control of Panoramic AI Business Intelligence. - Approach to resilience
-
Once on-boarded, Panoramic AI Business Intelligence installation and configuration is completely automated. In the event of a catastrophic system failure the complete system can retargeted to a new environment (Cloud, virtual machines, etc) and be redeployed. This process typically takes 2 hours to complete at which point backup data can begin to be loaded.
The Panoramic AI Business Intelligence database is separated from the application which allows normal IT management including backup/restore following the business unit policies for the configuration of Panoramic AI Business Intelligence. In the event of a backup recovery being required the backup data is used to re-populate Panoramic AI Business Intelligence to the previous backup snapshot. - Outage reporting
- Panoramic AI Business Intelligence includes a monitoring component. The monitoring component can provide a dashboard or API that users can log into to see reports and charts regarding service availability and any outages. Email alerts can be configured.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Access restrictions in management interfaces and support channels
- Management interfaces require authentication in the form of either username/password or public key authentication; management users are assigned a specific role which enables interaction with these interfaces.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Intertek
- ISO/IEC 27001 accreditation date
- 28/03/2024
- What the ISO/IEC 27001 doesn’t cover
- All of Analytics Engines operations and provision of data and analytics software and services are included in the scope.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
Analytics Engines have a policy manual in place which demonstrates how the company meets the requirements of the Information Security Management System – ISO 27001. It includes the policy, responsibilities, and acts as a signpost to related system documentation.
Policy and Procedure Documents
Policy and Procedure Documents have been prepared to cover situations where their absence could lead to deviations from the company’s Information Security objectives and would introduce or elevate Information Security risks to unacceptable levels.
Internal Management
Analytics Engines has an ISMS coordinator who is responsible for the day-to-day tasks of ISO 27001. Ultimate responsibility of the system lies with the ISMS owner who reports to the Directors of the company. We have assigned IT team members who deal with technical tasks on a daily basis.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Service components are versioned and kept under source control in private software repositories. A staging/pre-production system is maintained which is updated with the most recent build each night. All code changes are reviewed for functionality and security before being released to staging. Any changes to production service components are subject to buyer user review and functional regression testing on this staging system prior to release to production.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Vulnerability management patching follows ISO 27001 processes. Potential threats to the Panoramic AI Business Intelligence service are identified through a variety of means: including regular Penetration Testing, subscription to industry standard threat information system vulnerability listings, and regular OS and software level release information.
Our aim is to patch critical vulnerabilities within 14 days, ideally within 7 days. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
The service collects relevant accounting and audit information. Administrators can examine the audit information and in the case of finding any suspicious activity request support from Analytics Engines for further investigations.
Specific triggers and alerts can be defined in collaboration with the buyer.
Where possible the system will be locked down while analysis of compromises takes place before being restored - where possible from a backup prior to any compromise. - Incident management type
- Supplier-defined controls
- Incident management approach
-
Incident management events are captured following an ISO27001 policy. Users (internal, external) have a specified contact for incident management reports.
Once an incident is raised, an investigation is started to look into an event; determine scope and scale of the incident; and devise response timelines and strategy. Once an investigation is concluded a report is generated which can be provided to the user.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
We deliver digital projects that equip our clients to make better data based decisions, removing the need for printing paper documentation and enabling improved efficiencies. We also educate and empower staff to take action – working from home, cycle to work, online meetings; establish company baseline to understand our impact; measure and improve; and influence our customers and stakeholders.Covid-19 recovery
We continue to work with a range of public sector organisations delivering data analytics solutions and support that enables them to better understand the impacts of the pandemic and to make data based policy and decisions about the nature of support they will implement.Tackling economic inequality
As a rapidly growing Belfast based company in a high growth technology sector we always seek to create employment and training opportunities locally. We are open to working and partnering with new and small businesses to enhance our delivery capability and provide them with opportunities for growth.Equal opportunity
At our organization, we are committed to addressing and remedying inequality in employment, skills, and pay within the contract workforce. We recognize that this is a complex issue that requires a multifaceted approach, and we have taken significant steps to make a positive impact. This includes: Equal Opportunity Hiring, Training and Skill Development, Fair Compensation Practices, Mentorship and Career Advancement, Supplier Diversity, Regular Monitoring and Reporting, and Community Engagement.Wellbeing
At Analytics Engines, we are deeply committed to data-driven solutions that not only transform organisations but also positively impact the communities we serve and ensure the wellbeing of our staff. Our core values revolve around harnessing the power of data to enhance community well-being alongside a “do no harm” ethos. Our commitment to this endeavour involves harnessing data for precise community understanding and engagement, which is a cornerstone of our data-driven approach. We emphasize co-design with the community, where data-driven insights inform the design of goods, services, and works under the contract. We believe in data-driven inclusivity. Our past projects highlight how we've integrated inclusivity and accessibility into data-driven solutions. We understand the need for flexibility in the face of evolving community needs and our commitment extends to our workforce through employee volunteering schemes. Wellbeing is integrated into all employment, projects and company activities; we implement: flexible holidays, flexible working, health insurance, mental health hotline, gym membership, and support for personal charitable time.
Pricing
- Price
- £1,000 to £20,000 a unit a month
- Discount for educational organisations
- Yes
- Free trial available
- No