Adatis

Microsoft Data Analytics

As a Data Analytics and Business Intelligence specialist, Adatis are able to provide fully managed BI platforms "As A Service". Using the Microsoft business intelligence stack and combined with our discover, build, manage approach we enable organisations to understand and leverage their data, enabling critical decision making.

Features

  • Fully managed data analytics and reporting platform
  • Create, schedule, orchestrate and manage data pipelines
  • Provide management information and dashboards
  • Connect to on-premises and cloud data sources.
  • Combine disparate data sources

Benefits

  • Gets valuable data to where it needs to be.
  • Ingest vast amounts of data from on-premises and cloud sources.
  • Make your data available to other processes and sevices.
  • Integrate and cleanse, creating a single organisational view of information
  • Access dashboards and reports on mobile devices
  • Take advantage of Adatis' proven BI framework

Pricing

£0.1 per unit per hour

  • Free trial available

Service documents

G-Cloud 11

358948678854827

Adatis

Martin Philpott

1252267777

gcloud@adatis.co.uk

Service scope

Service scope
Software add-on or extension Yes
What software services is the service an extension to Additional Microsoft Azure Data Platform and Analytics tools
Cloud deployment model Public cloud
Service constraints No service constraints
System requirements Microsoft Azure tenancy and subscription

User support

User support
Email or online ticketing support Yes, at extra cost
Support response times SLA's will be agreed with the client during service design.
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support Yes, at extra cost
Support levels Each support service is tailored to an individual requirements.

A service manager will be assigned to each individual support service to manage all incidents and problems
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Adatis provide a full range of services from initial configuration through to full 24/7 management. Training (both on-site and off-site) can be provided along with user documentation.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction Please see https://products.office.com/en-us/business/office-365-online-data-portability
End-of-contract process Upon expiration or termination of your contract, Adatis will work with you to ensure all data can be extracted. The cost will depend upon the volume of data and the extraction format.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install Yes
Compatible operating systems
  • Android
  • IOS
  • Linux or Unix
  • MacOS
  • Windows
  • Windows Phone
Designed for use on mobile devices Yes
Differences between the mobile and desktop service The service is optimised for mobile, desktop and tablet use and there are differences. Core functionality is available across all platforms.
API Yes
What users can and can't do using the API The full API details are available online at Microsoft.com
API documentation Yes
API documentation formats HTML
API sandbox or test environment Yes
Customisation available Yes
Description of customisation Adatis provide services to help users adopt new technologies and to assist in becoming more productive.

Scaling

Scaling
Independence of resources Please see https://www.microsoft.com/en-us/trustcenter/default.aspx

Analytics

Analytics
Service usage metrics Yes
Metrics types Full metrics on usage, costs incurred, data volumes, compute units are available
Reporting types
  • API access
  • Reports on request

Resellers

Resellers
Supplier type Reseller providing extra features and support
Organisation whose services are being resold Microsoft / Microsoft CSP

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • EU-US Privacy Shield agreement locations
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach Users can either extract data themselves using Microsoft tools or Adatis can assist in providing data extraction services.
Data export formats
  • CSV
  • Other
Other data export formats
  • Data can be transformed upon extraction
  • Various common data formats
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats Ability to connect to multiple existing data sources

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)
  • Other
Other protection between networks For data in transit, all customer-facing servers negotiate a secure session by using TLS/SSL with client machines to secure the customer data.
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Availability and resilience
Guaranteed availability SLA's are tailored for each individual client with full DR and dual running available.
Approach to resilience Available on request
Outage reporting A service status portal is available as well as pro-active monitoring from Adatis support services.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels Azure comes with a set of administrator roles that you can assign to users in your organization. Each admin role maps to common business functions, and gives those people permissions to do specific tasks.
Access restriction testing frequency At least once a year
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for Between 6 months and 12 months
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for Between 6 months and 12 months
How long system logs are stored for Between 6 months and 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach Adatis are used to working in secure environments and adopt clients information security principles complimenting our own internal information security policies and procedures.
Information security policies and processes A nominated information security controller is responsible for internal Adatis policies and procedures which are available upon request.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Adatis manage configuration and change through a set of internally defined processes which are designed to work with our clients own requirements, whilst also utilising Microsoft change management processes.
Vulnerability management type Undisclosed
Vulnerability management approach In support of the Information Security Policy, Microsoft runs multiple layers of antivirus software to ensure protection from common malicious software. Servers within the Azure environment run anti-virus software that scans files uploaded and downloaded from the service for viruses or other malware.

Microsoft has its own Security Response Center (MSRC) that also supplies information to all our customers covering the whole range Microsoft products.
More information can be found at the Security TechCenter MSRC page.

Microsoft implements technologies to routinely scan the environment for vulnerabilities.
Protective monitoring type Undisclosed
Protective monitoring approach Azure employs sophisticated software-defined service instrumentation and monitoring that integrates at the component or server level, the datacenter edge, our network backbone, Internet exchange sites, and at the real or simulated user level, providing visibility when a service disruption is occurring and pinpointing its cause.

Proactive monitoring continuously measures the performance of key subsystems of the Azure services platform against the established boundaries for acceptable service performance and availability. When a threshold is reached or an irregular event occurs, the monitoring system generates warnings so that operations staff can address the threshold or event.
Incident management type Undisclosed
Incident management approach All incidents are raised to the Adatis support service via phone, email or web. The incident is then triaged and a fix is either implemented by internal support staff or escalated to Microsoft.

Incident reports are communicated via email/phone.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £0.1 per unit per hour
Discount for educational organisations No
Free trial available Yes
Description of free trial Adatis can organise a free trial of the software as part of a proof of concept exercise.

Service documents

pdf document: Pricing document pdf document: Skills Framework for the Information Age rate card pdf document: Service definition document pdf document: Terms and conditions
Service documents
Return to top ↑