Data warehouse automation for business reporting

The fastest, most cost-effective way to get accurate, trusted reporting. With smart data connectors, pre-built data models and analytics for Microsoft Dynamics, Sage, SAP and more. Fast connect to any other ERP, CRM, finance application, line of business software or network accessible datasource or file. Compatible with Tableaux, PowerBI, PowerPivot.


  • Interface with any ERP application, datasource or file
  • Cloud based, robust and scalable.
  • Deliver enhanced, financial and operational reporting
  • Role based dashboards & user level data security access
  • Automate the access, integration and preparation of data for reporting
  • Deploys with over 500 pre-built data models and analytics
  • Achieve data compliance with reduced IT overheads
  • Report on all data sources from one application
  • Data warehouse comes with PowerBI and Tableaux connectors
  • Automate the issue of standard management report packs


  • Centralise data warehouse management
  • Decrease data ownership costs for both IT and the business
  • Improve data accessibility and data access controls
  • Easy to use and manage, reducing IT overhead compliance costs
  • Secure online availability; anytime, anywhere
  • Removes reliance on spreadsheets, no more silo reporting.
  • Remove the risk of reporting errors
  • Standardise KPI, analytics and performance calculations
  • Flexible deployment: on-premise, cloud or hybrid
  • Drill into and colour code data for ease of interpretation


£12,000 an instance a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at nick.tucker@x3consulting.com. Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 12

Service ID

1 6 6 6 6 0 5 1 5 6 3 9 7 3 3


Telephone: 08450943885
Email: nick.tucker@x3consulting.com

Service scope

Software add-on or extension
Cloud deployment model
  • Public cloud
  • Hybrid cloud
Service constraints
Refer to Service Delivery documentation
System requirements
  • Compatible with MAC and Windows operating systems
  • Internet connectivity required for device access
  • Integrated VPN user access can be supported. Check on application

User support

Email or online ticketing support
Email or online ticketing
Support response times
Please refer to the Service Description document for Support SLA details
User can manage status and priority of support tickets
Online ticketing support accessibility
None or don’t know
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Onsite support
Yes, at extra cost
Support levels
Please refer to our Service Description for details on the SLA's for support
Support available to third parties

Onboarding and offboarding

Getting started
Product deployment requires a review of reporting needs to properly assess the required outputs. Scoping is provided (onsite or remote) together with full support through testing, training and deployment to a live environment. Standard user documentation is available and can be tailored to suit the exact needs of the project (additional fees may apply). Project management is integral to the whole project delivery process along with data migration/import, report design and ongoing application support. Typical installs can take as little as 3-4 days once the scoping/analysis phase has been completed depending on the data sources, customer skills and user learning capability.
Service documentation
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Data can be exported for delivery to the customer. A small charge for the time taken to perform the extract is levied.
End-of-contract process
The contract is for a set minimum term. At the end of the contract the user has the option to obtain a copy of the data held in the software or renew for a further period of use for continued access. A fee relating to the time taken to prepare the data file is levied.

Additional costs will be incurred for the management of the data into a set format at the request of the end user such as for the purposes of import to another application.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Designed for use on mobile devices
Service interface
What users can and can't do using the API
Integration uses several forms of technology which are utilised by the service provider in relation to various security and resource management features. Users can be trained on how to execute calls within the API although this is normally the role of the service provider.
API documentation
API documentation formats
API sandbox or test environment
Customisation available
Description of customisation
Elements of the application can be customised as part of the configuration for use by the partner to the customer. These relate to depth of data integration for detailed analysis, workflow and automation as well as modelling methods. Users can be trained to be able to take ownership of adding new data sources, creating models etc in the data warehouse. This is a semi-technical activity generally requiring a good knowledge of SQL, data analysis and data profiling.


Independence of resources
Assets are deployed in line with vendor recommendations and applied to each individual customer install. Assets can be increased to improve performance (for additional cost) where for example the customer has unusually large transaction or data volumes. Over-utilisation by other customers doesn't impact the performance experience as the assets provided are a dedicated minimum level specific for your instance. Charges are levied based on the overall data warehouse sizings. Refer to the pricing schedule for more detail.


Service usage metrics
Metrics types
We provide information on overall system uptime & performance metrics of the application.
Reporting types
Reports on request


Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Zap Data Hub

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
  • Other
Other data at rest protection approach
For further details on protection of data at rest please refer to the Microsoft published materials for Azure:

as well as

Data sanitisation process
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Data can be exported using application tools for use in products such as Microsoft Excel and PowerBI (or other visualisation tools if configured), alternatively the data can be retrieved in Excel or CSV format. Data can be "printed" to PDF format - such as dashboards, board/report packs etc
Data export formats
  • CSV
  • Other
Other data export formats
  • Microsoft Excel
  • PowerBI
  • Picture (PNG)
Data import formats
  • CSV
  • Other
Other data import formats
Direct Integration

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Other
Other protection between networks
Several options for implementation of protection between networks exist and are described in the Services Guide. Some may incur additional charges. Please refer to this document.
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Other
Other protection within supplier network
Microsoft Azure Storage and Azure SQL Database encrypt data at rest by default. Options are described in the Services Document of the additional data protection services that are available. Note some forms of protection may attract additional charges.

Availability and resilience

Guaranteed availability
Refer to the Microsoft Azure Terms of Licensing which can be found here:- http://www.microsoftvolumelicensing.com/Downloader.aspx?DocumentId=13655
Approach to resilience
Details on the datacenter structure and performance can be found here: https://azure.microsoft.com/en-gb/global-infrastructure within which can be found details on the Azure global and regional data centres including the UK South (London) and UK West (Cardiff) data centres.

Further information regarding security and resilience can be found here: https://www.microsoft.com/en-gb/TrustCenter/
Outage reporting
A public dashboard can be found here:

Specific individual reporting is available via the portal (login required): https://portal.azure.com/#blade/Microsoft_Azure_Health/AzureHealthBrowseBlade/serviceIssues

Email alerts can be configured in agreement with the customer subject to notification policies of the customer on recipient emails from 3rd party automated services.

Identity and authentication

User authentication needed
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
Support access is provided using the same credential requirements as that of a customer user. Interface to the applications is via secure and expiring token access.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
Between 1 month and 6 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
Between 1 month and 6 months
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
Schellman & Company, LLC
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
UK Service provider interaction with the Microsoft Azure platform.
ISO 28000:2007 certification
CSA STAR certification
CSA STAR accreditation date
CSA STAR certification level
Level 3: CSA STAR Certification
What the CSA STAR doesn’t cover
UK Service provider interaction with the Microsoft Azure platform.
PCI certification
Who accredited the PCI DSS certification
Schellman & Company, LLC
PCI DSS accreditation date
What the PCI DSS doesn’t cover
UK Service provider interaction with the Microsoft Azure platform. API interaction with Microsoft Azure PCI services.
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
  • CSA CCM version 3.0
  • ISO/IEC 27001
Information security policies and processes
See Security Management in the Services Guide. Microsoft Azure security is explained in more detail here https://docs.microsoft.com/en-gb/azure/security/fundamentals/overview

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Refer to the Services Guide.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Relevant vendor patches are applied at the earliest point of release in a structure manner. Threats are assessed in the Public Hosted environment and covered with the managed service SLA's. Threat assessments come from the AV vendor, application author and hosting partner .
Protective monitoring type
Protective monitoring approach
Public/Hosted application are 3rd party supplier monitored using industry standard procedures relevant to the type of hosting and choice of platform as part of the managed service delivery.
Incident management type
Incident management approach
Incidents are managed using a web based application to record instances of issues and problems. A service level agreement provides for response times and the incidents are managed on a daily basis for review and update. Reports are provided using a self service ticket portal for authorised support users.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks


£12,000 an instance a year
Discount for educational organisations
Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at nick.tucker@x3consulting.com. Tell them what format you need. It will help if you say what assistive technology you use.