Skip to main content

Help us improve the Digital Marketplace - send your feedback

Mazepoint Limited

Mazepoint Finance and Operations Analytics

This service delivers financial and operational management reporting, planning, budgeting, forecasting, ad hoc analytics and scenario modelling. Using Business Intelligence tools such as Jedox, Tableau, PowerBI and Artificial Intelligence, regular management control activities are more efficient and accurate, automating data loads, consolidations and workflow with full audit and security compliance.


  • Top down and bottom up planning, budgeting and automatic consolidation
  • Data modelling and blending on-the-fly
  • Artificial Intelligence integration
  • Complete customisation to customer's finance and business model
  • Spreadsheet skills transferable for planning, forecasting, analysis and reporting
  • Integrated workflow modelling with rules to trigger next steps
  • Auditable data writeback capability with comprehensive calculation engine
  • Fully cloud based service accessed through browsers (no local installation)
  • Light IT touch with full compliance (ISO27001 and CyberEssentials Plus)
  • PowerBI, Tableau, Qlik and other 3rd party connectors available


  • Single version of truth increases credibility of performance reporting
  • Reduce budgeting and forecasting cycles from weeks to hours
  • Enables data insights previously too hard or costly to produce
  • Significant reductions in data processing time and errors
  • Familiar spreadsheet and web interfaces limit training requirements
  • Limited requirement for internal IT resources to implement and monitor
  • Applicable to a wide range of financial and operational uses
  • Simplifies and streamlines administration and control
  • Integration with a wide range of familiar third party technologies
  • Fast analysis and prototyping amalgamating multiple data sources


£750 a user a month

  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 13

Service ID

9 9 6 1 9 3 5 4 4 9 6 5 8 0 8


Mazepoint Limited James Noble
Telephone: 020 7348 7600

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Other Mazepoint G-Cloud listings (Cloud Hosting, Cloud Software, Cloud Support).
Cloud deployment model
Private cloud
Service constraints
On-site support at extra cost. Remote support available in the UK during normal office hours 8:30 to 17:30 (except public holidays, weekends or between Christmas and New Year).
System requirements
  • Jedox Software licences
  • MS Office including Excel 2010 or higher
  • Windows 10 or newer
  • 2GB to 8GB RAM
  • Windows: Intel Pentium 4 or AMD Opteron processor or newer
  • MAC and Windows: min 1366x768 screen resolution
  • Minimum 20Mbps Internet connection recommended
  • Optional PowerBI, Tableau or Qlik licences and R open source

User support

Email or online ticketing support
Yes, at extra cost
Support response times
Response times depend on the level of support required, ranging from 1 hour response for Critical issues for the Premium Service, resolution target within 4 hours, to 2 days response and 5 days resolution target for Standard Service. Support hours do not include week-ends.
User can manage status and priority of support tickets
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Onsite support
Yes, at extra cost
Support levels
Our approach to service levels is based on ITIL standards and is detailed in our Cloud Support Service Description document. In principle it supports the identification, management, resolution, and considered future mitigation of issues through a multi-level support structure, contactable through various channels and operating during normal UK office hours of 8:30 - 17:30, Monday to Friday (except UK public holidays and the period between Christmas and New Year). Other support arrangements are available on request.
Support available to third parties

Onboarding and offboarding

Getting started
Tailored to each customer's requirements, can include onsite, online training and user documentation
Service documentation
Documentation formats
End-of-contract data extraction
Users can extract defined data utilising the User Interface available within the software. Upon request, Mazepoint will provide a complete data set, at an extra cost
End-of-contract process
The service will be turned off at the end of the contract and no further charges will be incurred. However there would be an additional cost for further data extraction depending on the amount of data requested, for which Mazepoint will provide a quotation.

Using the service

Web browser interface
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
Compatible operating systems
  • Android
  • IOS
  • MacOS
  • Windows
  • Windows Phone
Designed for use on mobile devices
Differences between the mobile and desktop service
The Service is designed for both desktop and mobile device users, with the visualisations and functions adapted according to the device used. For example, some administration functions are not available on mobile devices as it is unlikely that the devices would be used for that purpose, the focus being on delivering performance information updates. In general, the mobile service tends to be a stripped down version of the desktop service focusing on the most important information, but this varies according to the visualisation tools used.
Service interface
User support accessibility
WCAG 2.1 A
What users can and can't do using the API
Several of the third party tools we work with have their own APIs and, if used in isolation and not part of one of our integration suites, these APIs can be used. Documentation for these APIs can be found on the third party websites or supplied by Mazepoint on request.
API documentation
API documentation formats
API sandbox or test environment
Customisation available
Description of customisation
This is a primarily customisable service due to the unique nature of each buyer’s model.

Any structure that can be modelled in Excel can be customised and enhanced by trained business analysts with this service, including calculations, hierarchies, dimensions, time periods, entities and consolidations. One component of this service (Jedox) uses Excel as the starting point and as the user interface, familiar to most business analysts, but removes Excel's main weaknesses. It is designed to manage volumes data beyond Excel’s capabilities, includes enterprise security that supports multiple user collaboration, with user security controlled down to individual cell level. It also includes a transparent audit trail of changes, and is designed with the flexibility to update models quickly. It also includes some artificial intelligence features, parsing data sources to create analytical models automatically, saving analyst time.

Data analyst users can create analytical models “on the fly” using their own mainstream data visualisation tools, such as PowerBI, Tableau and QlikView, which connect easily to the data model.


Independence of resources
Server capacity is managed within the virtualisation environment which is controlled by the infrastructure team using monitoring tools. Systems usage and capacity are monitored through the router logs which provide alerts to potential performance and capacity limits. Performance of specific customer applications is monitored regularly to ensure continuity of service. Customer websites and applications are continuously monitored with Site24x7. Project managers, delivery and support staff will be immediately updated on any resource capacity issues that arise on a customer's environment.


Service usage metrics
Metrics types
Please refer to our Service Definition document for more information.
Reporting types
  • Regular reports
  • Reports on request


Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Jedox, Microsoft, Tableau, The R Foundation

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
User interface included within the software that enables users to query the data held and export if required
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats
  • XML
  • SQL
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats
  • XML
  • SQL

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
Availability is defined as the time the service is available during the agreed service window i.e. outside of agreed downtime for maintenance and upgrades. Any further agreed downtime does not count towards the service availability statistic. Generally, Mazepoint offers a 99.7% service availability measured on a monthly basis which will be confirmed in the SLA. Any case of a breach of an SLA will be reported as an incident in Mazepoint's support ticketing system and assigned an impact and urgency level, which is accessible to the client.
Approach to resilience
The software solution provides a degree of resilience through componentisation. A failure in one component will not necessarily effect others. Further resilience at the application level (e.g. clustering) is not supported by the analytical components.
The underlying virtualised infrastructure runs on resilient host hardware. Virtual machines can be migrated between hosts with no loss in service and minimal disruption.
Firewalls are clustered and configured to failover in the event of an individual one failing.
Mazepoint’s data centre provider has highly resilient infrastructure including dual power feeds & backup generator capacity, and redundant cooling, offering power uptime SLA’s of 99.999%.
Internet connectivity is multi-homed via several suppliers to ensure continuous connectivity in the event of an ISP failure.
Outage reporting
Service availability at a client level is continuously monitored by Mazepoint. Any service failures will alert the Mazepoint Infrastructure team who will deal with the issue accordingly. An incident support ticket will be created, alerting the customer, and will be resolved in accordance to the agreed SLA. Live public service dashboards and direct email alerts are available on request at an additional cost.

Identity and authentication

User authentication needed
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
Mazepoint’s User Access Management Policy establishes the procedures for restricting access to prevent unauthorised access to information systems. The procedures are documented for new users, managing change, password and privilege management as well as regular reviews of user access rights. Group-based permissions are supplied within each service application, generally administered by the customer, with the capability to control each user’s data and information access rights down to an individual data cell. Mazepoint’s Password Security Policy establishes the standards required for password complexity and compliance measurement. Access to Mazesupport, Mazepoint’s support ticketing system is governed by similar user-access rights and passwords.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password
  • Other
Description of management access authentication
Management access is operated through the Mazesupport ticketing system and implemented by Mazepoint staff subject to the contract and Service Level Agreement. There is no direct access management portal.

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
British Assessment Bureau Limited
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
There are no exclusions to Mazepoint's ISO27001 certification.
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Cyber essentials
Cyber essentials plus
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
Without exception, all Mazepoint staff are contractually obliged to adhere to the principles of ISO27001:2013 and the GDPR in respect of information security. The company’s ISO27001 accreditation is based on a variety of policies, procedures, risk assessments and responsibilities, all of which are subject to regular external and internal audits, and staff are regularly reminded of their obligations and notified when policies and procedures are updated. The company’s ISO accreditation is led by the Managing Director, the management representative, who retains responsibility for overall observance of policies, processes and updates while delegating responsibility for monitoring and compliance, primarily to the infrastructure and administration teams but also to the software development and new business teams. Each policy and process includes compliance measurement which is carried out by the policy owner and verified by the management representative. The company’s online Information Security Management System maintains all policy and process information, including ISO9001:2008 documentation and the Feedback Reporting System for use by all staff. The Managing Director and all team leaders attend the audits to ensure that any observation or potential non-conformance is addressed with the appropriate level of urgency, and management reviews are carried out and documented by the management representative.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Mazepoint follow the ITIL methodology for configuration and change, defined mainly as Standard or Normal. Requests are logged via Mazepoint's support ticketing system (Mazesupport) and assessed in terms of risk, impact, and urgency. Standard (or pre-defined) changes will have an SLA and a pre-agreed process. Normal changes will result in a Statement-of-Works document which must be accepted prior to work commencing. This work may be chargeable. Once a change has been completed and internally tested, it maybe passed back to the client for UAT. Once the change has been accepted then it will be promoted into the production environment.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Mazepoint’s Vulnerability Management Policy documents this process which is enforced by the infrastructure team. Common vulnerabilities and exposures are routinely checked in accordance with the CVE database and other third party sources. Systems are monitored to detect and assess vulnerabilities which are then classified and prioritised by risk and urgency. Vulnerability removal is then planned and executed. Software updates are applied on a regular basis or immediately in the case of high risk, urgent vulnerabilities. User identity and access rights, hardware and software configuration standards, and network vulnerabilities are all regularly reviewed, assessed and tested, and remediation plans implemented.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
The firewall logs are regularly reviewed using the Intrusion Protection System monitoring tool dashboard to understand potential compromises. Firewall logs can be filtered based on IP address and server, and the SmartMonitor application monitors VPN connections and firewall activity. Management of incidents is documented in the Information Security Incident Management policy.
Incident management type
Supplier-defined controls
Incident management approach
Mazepoint’s Information Security Incident Management Policy documents this process. Security incidents that have a direct impact on a customer’s application or data will result in the customer being contacted immediately following incident identification, as well as the Information Commissioner's Office if applicable. Security incidents are logged in Mazepoint’s support ticketing system, Mazesupport, and the progress of open tickets tracked. Upon closure of a security incident ticket, the customer will receive a full report covering the time the incident was identified to its resolution. Monthly security and service reports are available to the customer at an additional cost.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
Connected networks
Other public sector networks

Social Value

Fighting climate change

Fighting climate change

Mazepoint is dependent on its Cloud Service suppliers for initiatives to reduce greenhouse gas emissions and support environmental protection and improvement, and takes care to select suppliers who have clear policies and procedures in this area. In its own operations these initiatives are a high priority. In its Environmental Policy, Mazepoint recognises that it has a responsibility to the environment beyond legal and regulatory requirements. The company is committed to minimising the impact of its operations and services on the environment, and the continual improvement of its environmental performance forms an integral part of its business strategy and operating methods. This policy document is available on request.
Covid-19 recovery

Covid-19 recovery

Mazepoint’s online business is designed to support its customers and staff in the way they operate, offering a high degree of flexibility, for example for office-based, home-based and hybrid working practices. This is reflected in Mazepoint’s own working conditions where office space is available to staff should they require it, while also giving all staff the option to work full time from home. The challenges and risks of full time home working are mitigated with regular internal project management and communications Teams calls, together with regular face-to-face informal staff events to help maintain morale.
Tackling economic inequality

Tackling economic inequality

Create new jobs and skills: As an entrepreneurial SME, Mazepoint is driven to identify new opportunities for growth, working with its customers to reduce inefficiencies and improve performance. Working in the IT sector which is currently suffering severe skill shortages, the company offers opportunities for young graduates and experienced staff equally to enhance their skills and deliver more value.
Increase supply chain resilience and capacity: Mazepoint’s Cloud Service offers supply chain resilience with the opportunity to switch suppliers, supporting innovation and disruptive technologies. The company’s commitment to the ISO27001 and CyberEssentials Plus standards ensures its continued vigilance over cyber security risks in all aspects of its operations.
Equal opportunity

Equal opportunity

As a matter of principle, Mazepoint wants its workforce to be truly representative of all sections of society and our customers, and for each employee to feel respected and able to give of their best. In addition, Under the Equality Act 2010, people are legally protected from discrimination in society, which includes protection for employees in the workplace. The company is committed to diversity and equality for all in employment with Mazepoint and to ensuring that this forms part of the company’s drive towards excellence in all of its activities.


Mazepoint sets the highest priority on the health and wellbeing of its staff, monitored and confirmed regularly by all managers with frequent, documented one-to-one sessions. The HR function keeps track of any personal issues and is available to provide support where needed, managing them with care and sensitivity. The company has documented policies to confirm this commitment, which are available on request.


£750 a user a month
Discount for educational organisations
Free trial available
Description of free trial
Please refer to our Service Definition document for more information.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.