DATASUMI LTD

Databricks Analytics: AWS & Azure

Databricks provides an efficient collaborative Apache Spark-based analytics platform within Azure & AWS. We are specialised in designing and collaborating with platform providers to accelerate your data analytics capabilities, AI, streamlining workflows and developing your data science collaborative workspaces on Azure Data Factory and AWS Data Lake.

Features

  • Integrates with data sources such as Azure & AWS DataLakes
  • Databricks unifies data-gathering, model-creation & deployments
  • Reduce cost and complexity with a managed, cloud-native platform
  • Identify Trends using Artificial Intelligence within Databricks
  • Import data/reports from Excel, CSV and Access files
  • Self-service collaboration tool for data scientists and analysts
  • Provides valuable analytics from the organisation's data assets
  • Integrates with Power BI and other Visualisation platforms

Benefits

  • Streamlined data processing workflows
  • Improve services quality, cost, flexibility and safety
  • Reduces deployment and migration times; therefore, costs and risks
  • Builds robust, reusable data models to provide consistency in reporting.
  • Secure, cloud-based service with access to management controls
  • Scales your analytics and data science projects
  • Share notebooks and reports in seconds with other users
  • Data quality controlled via the Databricks ETL processes
  • Quickly adds capacity reducing cost and complexity in cloud-native platform

Pricing

£0.30 to £0.50 a unit

  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at accounts@datasumi.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 12

Service ID

3 6 5 5 6 6 0 9 5 4 8 0 2 5 6

Contact

DATASUMI LTD Datasumi Team
Telephone: +442045770319
Email: accounts@datasumi.com

Service scope

Service constraints
No
System requirements
  • Functional internet browser
  • Working connection to the internet

User support

Email or online ticketing support
Email or online ticketing
Support response times
SLA's are variable depending on Client requirements. Our standard response time is within 2 hours for 'critical' issues, within 4 hours for 'high priority' issues, and within 1 business day for all other issues.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AAA
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
WCAG 2.1 AA or EN 301 549
Web chat accessibility testing
N/A
Onsite support
Yes, at extra cost
Support levels
We work to client approved support levels. As such, we will review our standard support offering against the aims and objectives for your software support. Our offering will then be suitably tailored to provide the best possible service. As standard, we offer a technical account manager and dedicated in-house support team - an online Help Desk with direct phoneline and email support - a test version of your software - maintenance of a dedicated support wiki - agreed escalation points - and regular performance reviews in-line with the SLA's. All of our pricing is highly competitive and will be determined, based on the complexity and demand of your support requirements.
Support available to third parties
No

Onboarding and offboarding

Getting started
1- Discovery
2- Proof of Concept
3- Production
4- Support and training
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
Our client owns all IPR and therefore there is no requirement for data extraction.
End-of-contract process
The contract pricing outlines everything in our proposal, to be delivered within the agreed timescales. Additional costs would only occur if the client requests further services that are outwith the original scope (e.g. additional functionality or extra training). At the end of the contract, the client will approve all of our work with a simple sign-off. As the client maintains all IPR for our services, they will then have full capability to maintain the service.

Using the service

Web browser interface
Yes
Using the web interface
Internet Explorer 7
Internet Explorer 8
Internet Explorer 9
Internet Explorer 10
Internet Explorer 11
Microsoft Edge
Firefox
Chrome
Safari 9+
Opera
Web interface accessibility standard
WCAG 2.1 AAA
Web interface accessibility testing
We adhere as closely as possibly with Gov UK's service manual for testing with assistive technologies.
API
Yes
What users can and can't do using the API
Our use of an API varies depending on the individual clients requirements. Full details will be provided in the API documentation, if an API is required.
API automation tools
Other
Other API automation tools
Databricks API
API documentation
Yes
API documentation formats
PDF
Command line interface
Yes
Command line interface compatibility
  • Linux or Unix
  • Windows
  • MacOS
Using the command line interface
Documentation can be provided on request

Scaling

Scaling available
Yes
Scaling type
Automatic
Independence of resources
This is a managed service by Microsoft.
Usage notifications
Yes
Usage reporting
Other

Analytics

Infrastructure or application metrics
Yes
Metrics types
Other
Other metrics
Report Usage Statistics
Reporting types
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Development and Delivery of Databricks Notebooks, reports & Dashboards

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
  • Hardware containing data is completely destroyed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Backup and recovery

Backup and recovery
Yes
What’s backed up
This information is available on request.
Backup controls
This information is available on request.
Datacentre setup
Multiple datacentres
Scheduling backups
Users schedule backups through a web interface
Backup recovery
  • Users can recover backups themselves, for example through a web interface
  • Users contact the support team

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
We guarantee 99.9% availability. In the extremely rare event that this is not the case, we will treat this as a Critical Issue and will work continuously on the problem until it is resolved. User refunds will be agreed prior to our engagement, and will reflect the significance of the issue and time exposure.
Approach to resilience
This information is available on request.
Outage reporting
We set up instant notifications, which tell us if our there is a service outage. We then contact our Client directly, to inform them of this issue. This is not an automated process, but it managed by our dedicated support team.

Identity and authentication

User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
We use IP restrictions, on top of authentication.
Access restriction testing frequency
Less than once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Devices users manage the service through
Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Access to user activity audit information
You control when users can access audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
You control when users can access audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
Yes
Any other security certifications
Cyber Essentials

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
We are ISO 27001 and Cyber Essentials accredited. Reporting comprises of automated notifications to us for any incident which suffers an outage, or required administrative access or an update. A breach in security would be reported to senior staff (i.e. Staff Member > Line Manager > Head of Service). All incidents and breaches in security will be immediately reported to the client, via our dedicated account manager. We ensure that policies are followed through regular external audits, as well as frequent internal reviews.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
We operate a change request process, which ensures both the requester and approver focus on five key points: has the change been tested; is there a rollback plan; which resources are required; what risks are involved; have relevant parties been informed. We approve change requests through relevant management representatives, as well as client contacts, where appropriate. We also record change requests against the appropriate project, and update related version documentation accordingly.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
We assess potential threats to our service through continuous monitoring and by receiving instant notifications for required patches. Notifications come immediately from trusted vendors only. Once we receive a notification, we will begin the process of deploying a patch as soon as possible. This will often require testing from the offset, to ensure that no levels of customisation are broken. All patches are communicated with the Client, from first notification, straight through to deployment.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
We perform a comprehensive range of testing methods on all of our development work, prior to deployment. This is conducted by our in-house Quality Assurance specialist, and serves to immediately detect compromises and vulnerabilities. Once identified, we may conduct additional testing after deployment, to specifically ascertain if the issue applies to our work. If it does, we will take action to patch this as soon as possible. If it doesn’t, we will assess the severity and choose an appropriate action, after discussion with the client. We respond to all incidents within client-approved service levels.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Incidents are reported to line management via task management system as per our Integrated Management System processes, as well as by email and/or in person. Reporting would carry on up to Managing Director level where deemed appropriate. Account managers will inform affected clients where applicable through similar means – email, phone call and/or in person.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
Yes
Who implements virtualisation
Supplier
Virtualisation technologies used
Other
Other virtualisation technology used
Microsoft Azure
How shared infrastructure is kept separate
VPC

Energy efficiency

Energy-efficient datacentres
Yes
Description of energy efficient datacentres
Microsoft adheres to the EU Code of Conduct for their Energy Efficient datacentres.

Pricing

Price
£0.30 to £0.50 a unit
Discount for educational organisations
No
Free trial available
Yes
Description of free trial
30 Day Free Trial or Free Databricks account with limited features

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at accounts@datasumi.com. Tell them what format you need. It will help if you say what assistive technology you use.