AT Technology Services Ltd

Ez Analytics

EZ Analytics is a population health management tool which integrates complex data from any data source, into user friendly information.
This platform enables decision support, helping clinicians/non-clinicians to easily identify areas which require optimisation at all population scales. EZ Analytics lets users view performance at individual practice level.


  • Dynamic and flexible reports on over all business performance
  • Business Intelligence dashboards for real-time patient management
  • Data quality and monitoring
  • Population health risk management
  • Income analysis and forecasting
  • Enterprise performance data repository solution


  • Self-service Business Intelligence platfrom
  • Long Term condition management
  • Digital first approach for care providers


£0.40 per person

Service documents


G-Cloud 11

Service ID

1 9 2 6 3 4 6 5 9 0 9 7 9 3 0


AT Technology Services Ltd

Hasib Aftab


Service scope

Service scope
Software add-on or extension No
Cloud deployment model
  • Public cloud
  • Private cloud
Service constraints None
System requirements
  • Tailored Solution for customers
  • Works on all web browsers

User support

User support
Email or online ticketing support Email or online ticketing
Support response times 24/7 support ticketing in place
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), 7 days a week
Web chat support Web chat
Web chat support availability 9 to 5 (UK time), 7 days a week
Web chat support accessibility standard WCAG 2.1 AAA
Web chat accessibility testing NA
Onsite support Onsite support
Support levels Customised Service Level Agreement with each customer
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Onsite training, workshops, virtual training and videos and materials
Service documentation Yes
Documentation formats
  • ODF
  • PDF
End-of-contract data extraction We provide option of data extraction or data wipe. But Data is passed onto clinical system which negates the reasons for data extraction
End-of-contract process Build into contract.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Mobile optimised - but also able to download App from android and IOS store
Service interface Yes
Description of service interface Use API centric approach and able to integrate with other services
Accessibility standards WCAG 2.1 AAA
Accessibility testing We have dedicated QA team
What users can and can't do using the API This is done via our technical team.
API documentation Yes
API documentation formats
  • Open API (also known as Swagger)
  • Other
API sandbox or test environment Yes
Customisation available Yes
Description of customisation Based on customer requirements - localised and white labelled


Independence of resources Scalable cloud based applicaiton


Service usage metrics Yes
Metrics types Through our dedicated analysis reporting tool
Reporting types Real-time dashboards


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance None

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations Yes
Datacentre security standards Managed by a third party
Penetration testing frequency At least every 6 months
Penetration testing approach Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach User can generate reports from system interface, based on the user profile
Data export formats
  • CSV
  • Other
Other data export formats Excel
Data import formats
  • CSV
  • Other
Other data import formats Excel

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Availability and resilience
Guaranteed availability Core Hours Availability - 99.9%
Approach to resilience Available on request.
Outage reporting Email Alerts and APIs

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • Public key authentication (including by TLS client certificate)
  • Limited access network (for example PSN)
  • Username or password
Access restrictions in management interfaces and support channels This product is a fully governed platform. Role-based access policy in place and it is administrated centrally by the company. support channels or end-user are restricted to make any changes.
Access restriction testing frequency At least every 6 months
Management access authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications
  • Working towards ISO27001
  • Cyber essentials
  • DSP Tool kit

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes All Data Protection and Security Toolkit policies

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Product or business road maps
Readiness assessments
Training Tutorials and Education Sessions
Stakeholder Feedback gathering and review
Post-deployment review
Performance measures and analytics
Change management risk analysis
Continuous Improvement Plan
Business case studies and knowledge management
Vulnerability management type Supplier-defined controls
Vulnerability management approach Real time threat monitoring systems.
Protective monitoring type Supplier-defined controls
Protective monitoring approach Based on service level agreements with customers - commercially approved audit tools are used to monitor processes
Incident management type Supplier-defined controls
Incident management approach Performing rout-cause analysis
Initial risk assessment forms and frameworks
Communication matrix with key people
Gathering evidences and documentation
Taking approach to minimise the risk or further damage
based on customer agreement - predefined processes and tools used for incident management

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks Yes
Connected networks
  • NHS Network (N3)
  • Health and Social Care Network (HSCN)


Price £0.40 per person
Discount for educational organisations Yes
Free trial available Yes
Description of free trial Subject to request
Link to free trial

Service documents

Return to top ↑