Power BI Healthcare Portal copy
Self Service BI Portal for Helathcare Providers
Features
- Real time, self service reporting
Benefits
- Ease of publishing content
- Zero cost change capability
Pricing
£50000 to £100000 per licence
Service documents
Framework
G-Cloud 11
Service ID
347862614796863
Contact
Service scope
Software add-on or extension | No |
Cloud deployment model | Public cloud |
Service constraints | No |
System requirements |
|
User support
Email or online ticketing support | No |
Phone support | Yes |
Phone support availability | 9 to 5 (UK time), Monday to Friday |
Web chat support | No |
Onsite support | Yes, at extra cost |
Support levels | Consultancy based services related to providing additional functionality and use of artificial intelligence |
Support available to third parties | No |
Onboarding and offboarding
Getting started | Onsite training is provided |
Service documentation | Yes |
Documentation formats | |
End-of-contract data extraction | Simply turn of their dat feed to empty the portal |
End-of-contract process | Na |
Using the service
Web browser interface | Yes |
Supported browsers |
|
Application to install | No |
Designed for use on mobile devices | Yes |
Differences between the mobile and desktop service | None |
API | No |
Customisation available | Yes |
Description of customisation | Look and feel of BI Outputs |
Scaling
Independence of resources | The service is scalable based on upfront demand forecasts |
Analytics
Service usage metrics | No |
Resellers
Supplier type | Not a reseller |
Staff security
Staff security clearance | Conforms to BS7858:2012 |
Government security clearance | Up to Baseline Personnel Security Standard (BPSS) |
Asset protection
Knowledge of data storage and processing locations | No |
Datacentre security standards | Complies with a recognised standard (for example CSA CCM version 3.0) |
Penetration testing frequency | At least every 6 months |
Penetration testing approach | ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider |
Protecting data at rest |
|
Data sanitisation process | No |
Equipment disposal approach | Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001 |
Data importing and exporting
Data export approach | Using standard toolsets |
Data export formats |
|
Other data export formats |
|
Data import formats | Other |
Other data import formats | SQL |
Data-in-transit protection
Data protection between buyer and supplier networks | Other |
Other protection between networks | Not applicable |
Data protection within supplier network |
|
Availability and resilience
Guaranteed availability | N/a |
Approach to resilience | N/a |
Outage reporting | N/a |
Identity and authentication
User authentication needed | Yes |
User authentication | Username or password |
Access restrictions in management interfaces and support channels | NA |
Access restriction testing frequency | At least every 6 months |
Management access authentication | Username or password |
Audit information for users
Access to user activity audit information | Users have access to real-time audit information |
How long user audit data is stored for | Between 6 months and 12 months |
Access to supplier activity audit information | Users have access to real-time audit information |
How long supplier audit data is stored for | Between 6 months and 12 months |
How long system logs are stored for | At least 12 months |
Standards and certifications
ISO/IEC 27001 certification | No |
ISO 28000:2007 certification | No |
CSA STAR certification | No |
PCI certification | No |
Other security certifications | No |
Security governance
Named board-level person responsible for service security | Yes |
Security governance certified | Yes |
Security governance standards | ISO/IEC 27001 |
Information security policies and processes | We don’t hold customers data |
Operational security
Configuration and change management standard | Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402 |
Configuration and change management approach | Standard ITIl Lifecycle utilising change control software |
Vulnerability management type | Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402 |
Vulnerability management approach | Not applicable |
Protective monitoring type | Undisclosed |
Protective monitoring approach | Not applicable |
Incident management type | Undisclosed |
Incident management approach | Not applicable |
Secure development
Approach to secure software development best practice | Conforms to a recognised standard, but self-assessed |
Public sector networks
Connection to public sector networks | Yes |
Connected networks | NHS Network (N3) |
Pricing
Price | £50000 to £100000 per licence |
Discount for educational organisations | No |
Free trial available | No |