Microsoft Data Analytics

As a Data Analytics and Business Intelligence specialist, Adatis are able to provide fully managed BI platforms "As A Service". Using the Microsoft business intelligence stack and combined with our discover, build, manage approach we enable organisations to understand and leverage their data, enabling critical decision making.


  • Fully managed data analytics and reporting platform
  • Create, schedule, orchestrate and manage data pipelines
  • Provide management information and dashboards
  • Connect to on-premises and cloud data sources.
  • Combine disparate data sources


  • Gets valuable data to where it needs to be.
  • Ingest vast amounts of data from on-premises and cloud sources.
  • Make your data available to other processes and sevices.
  • Integrate and cleanse, creating a single organisational view of information
  • Access dashboards and reports on mobile devices
  • Take advantage of Adatis' proven BI framework


£0.1 per unit per hour

  • Free trial available

Service documents


G-Cloud 11

Service ID

3 5 8 9 4 8 6 7 8 8 5 4 8 2 7



Martin Philpott


Service scope

Software add-on or extension
What software services is the service an extension to
Additional Microsoft Azure Data Platform and Analytics tools
Cloud deployment model
Public cloud
Service constraints
No service constraints
System requirements
Microsoft Azure tenancy and subscription

User support

Email or online ticketing support
Yes, at extra cost
Support response times
SLA's will be agreed with the client during service design.
User can manage status and priority of support tickets
Online ticketing support accessibility
None or don’t know
Phone support
Phone support availability
24 hours, 7 days a week
Web chat support
Onsite support
Yes, at extra cost
Support levels
Each support service is tailored to an individual requirements.

A service manager will be assigned to each individual support service to manage all incidents and problems
Support available to third parties

Onboarding and offboarding

Getting started
Adatis provide a full range of services from initial configuration through to full 24/7 management. Training (both on-site and off-site) can be provided along with user documentation.
Service documentation
Documentation formats
End-of-contract data extraction
Please see
End-of-contract process
Upon expiration or termination of your contract, Adatis will work with you to ensure all data can be extracted. The cost will depend upon the volume of data and the extraction format.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Compatible operating systems
  • Android
  • IOS
  • Linux or Unix
  • MacOS
  • Windows
  • Windows Phone
Designed for use on mobile devices
Differences between the mobile and desktop service
The service is optimised for mobile, desktop and tablet use and there are differences. Core functionality is available across all platforms.
Service interface
What users can and can't do using the API
The full API details are available online at
API documentation
API documentation formats
API sandbox or test environment
Customisation available
Description of customisation
Adatis provide services to help users adopt new technologies and to assist in becoming more productive.


Independence of resources
Please see


Service usage metrics
Metrics types
Full metrics on usage, costs incurred, data volumes, compute units are available
Reporting types
  • API access
  • Reports on request


Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Microsoft / Microsoft CSP

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • EU-US Privacy Shield agreement locations
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
Data sanitisation process
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Users can either extract data themselves using Microsoft tools or Adatis can assist in providing data extraction services.
Data export formats
  • CSV
  • Other
Other data export formats
  • Data can be transformed upon extraction
  • Various common data formats
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats
Ability to connect to multiple existing data sources

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)
  • Other
Other protection between networks
For data in transit, all customer-facing servers negotiate a secure session by using TLS/SSL with client machines to secure the customer data.
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
SLA's are tailored for each individual client with full DR and dual running available.
Approach to resilience
Available on request
Outage reporting
A service status portal is available as well as pro-active monitoring from Adatis support services.

Identity and authentication

User authentication needed
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels
Azure comes with a set of administrator roles that you can assign to users in your organization. Each admin role maps to common business functions, and gives those people permissions to do specific tasks.
Access restriction testing frequency
At least once a year
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Between 6 months and 12 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
Between 6 months and 12 months
How long system logs are stored for
Between 6 months and 12 months

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance approach
Adatis are used to working in secure environments and adopt clients information security principles complimenting our own internal information security policies and procedures.
Information security policies and processes
A nominated information security controller is responsible for internal Adatis policies and procedures which are available upon request.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Adatis manage configuration and change through a set of internally defined processes which are designed to work with our clients own requirements, whilst also utilising Microsoft change management processes.
Vulnerability management type
Vulnerability management approach
In support of the Information Security Policy, Microsoft runs multiple layers of antivirus software to ensure protection from common malicious software. Servers within the Azure environment run anti-virus software that scans files uploaded and downloaded from the service for viruses or other malware.

Microsoft has its own Security Response Center (MSRC) that also supplies information to all our customers covering the whole range Microsoft products.
More information can be found at the Security TechCenter MSRC page.

Microsoft implements technologies to routinely scan the environment for vulnerabilities.
Protective monitoring type
Protective monitoring approach
Azure employs sophisticated software-defined service instrumentation and monitoring that integrates at the component or server level, the datacenter edge, our network backbone, Internet exchange sites, and at the real or simulated user level, providing visibility when a service disruption is occurring and pinpointing its cause.

Proactive monitoring continuously measures the performance of key subsystems of the Azure services platform against the established boundaries for acceptable service performance and availability. When a threshold is reached or an irregular event occurs, the monitoring system generates warnings so that operations staff can address the threshold or event.
Incident management type
Incident management approach
All incidents are raised to the Adatis support service via phone, email or web. The incident is then triaged and a fix is either implemented by internal support staff or escalated to Microsoft.

Incident reports are communicated via email/phone.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks


£0.1 per unit per hour
Discount for educational organisations
Free trial available
Description of free trial
Adatis can organise a free trial of the software as part of a proof of concept exercise.

Service documents

Return to top ↑