EO Consulting Ltd

Data Analytics and Benchmarking

Data Analytics and Benchmarking service helps improve resource allocation within public sector organisations by creating built-in data models and intelligent narratives of the key benchmarks and KPIs needed to improve operational efficiency and effectiveness and presents the results in user friendly and interactive dashboards on an embedded business intelligence portal.


  • Embedded Business intelleigence / Analytics platform on premise or Cloud
  • Self-service decentralised analytic and reporting capabilities
  • Data preparation tools and processes
  • Prescribed statistical functions and algorithms
  • Analytic and interactive dashboards, reporting and visualisation
  • Intelligent narrative reporting
  • Simplified and customisable Analytics and User Experience
  • Business Intelligence, Analysis and Reporting
  • Big Data Manipulation and Full Analysis Capability


  • Intuitive Interface Enables Users to Ensure a Reliable Transformation Process
  • Modifications to Incorporate Additional Sources can Easily be Implemented
  • Improved Speed, Quality and Accuracy of reporting with deeper insight
  • Blend All Data in Real Time and Obtain Immediate Results
  • Broad and Deep Big Data Integration
  • In built analysis for total operational performance of schools
  • Automated Processes between collection, analysis and reporting of data


£500 per unit per year

  • Education pricing available
  • Free trial available

Service documents


G-Cloud 11

Service ID

4 4 5 5 2 2 1 7 6 0 0 3 2 2 4


EO Consulting Ltd

Jonathan Coyles



Service scope

Service scope
Software add-on or extension No
Cloud deployment model Public cloud
Service constraints None
System requirements None

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Email support is available form 08:00 to 18:00 Monday to Friday
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels Single inclusive support level - 1 hr from 8am to 6pm Monday to Friday with individual specified account manager.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started We have a three stage process to client engagement: Enable | during the initial client engagement we will have hopefully gained a detailed understanding of our clients requirements and the project initiation phase will ensure we enable our clients to understand what is possible with the solutions they have purchased form us. We will agree the collection and reporting tools they initially require to support there day to day operational requirements and take their data and embed it in our collection and dashoarding tools. Empower | once the raw client data is live we will support the client with a bespoke training plan to ensure they are empowered to use the tools we have provided . This usually takes the form of one to one and group training at client sites as we have found face to face training is more empowering than online training. Engage | we have found it essential to regularly engage with our clients to ensure that their questions are answered and support is provided so the full benefits of our solutions are employed. We therefore schedule monthly appointments with our clients.
Service documentation No
End-of-contract data extraction Data is provide to clients at the end of the contract in an excel compatible format at no cost if requested in 30 days of the contract expiring.
End-of-contract process At the end of the contract all user accounts will be deactivated within 4 hours and deleted within 48 hours. When the contract ends we will provide the data to clients in an excel format if requested during the first 30 days from the termination of the contract free of charge. At the end of the 30 days the data will be archived for a 12 month period; if the data is requested during that period there will be a charge for data recovery. At the end of the 12 months the client data will be deleted.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install Yes
Compatible operating systems
  • Android
  • IOS
  • MacOS
  • Windows
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Data collection from surveys undertaken on mobile devices. Reporting of data on desktop but also accessible on mobile.
Service interface No
What users can and can't do using the API At the moment our approach to using the REST API has been on a client specific basis and as such we have not placed any limitations on what a client can do.
API documentation Yes
API documentation formats PDF
API sandbox or test environment Yes
Customisation available Yes
Description of customisation We recognize the importance of user customisation to increase the adoption, knowledge sharing, and value discovery across individual public sector markets as shown in our School Benchmarking Service. We are able to offer a range of user personalisation from simple aspects of the solution such as client and user specific branding to the development of data capture solution and dashboard to support client specific key performance indicators. The customisation would normally be defined during the on boarding process but can be added at any point during the client relationship. Clients can develop there data collection templates and dashboards using excel and power bi templates which we provide; these however will be deployed to our cloud based solutions by our team in our standard service offering. In our bespoke offering clients are able to deploy templates and dashboards themselves however this will require further training and support.


Independence of resources We closely monitor the service performance of the client solutions we put in place and the use of the Microsoft Azure server platform allows us to scale the solution to meet client demand almost instantaneously.


Service usage metrics Yes
Metrics types We are able to monitor and report on user access and if they have completed the tasks allocated to them. Reports are available by user and by client.
Reporting types Reports on request


Supplier type Reseller providing extra features and support
Organisation whose services are being resold Microsoft Azure and Business Intelligence

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least every 6 months
Penetration testing approach ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest Physical access control, complying with CSA CCM v3.0
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach We have a standard set of dashboards which allow users to export data in the form or excel tables and pdf reports.
Data export formats
  • CSV
  • Other
Other data export formats PDF
Data import formats
  • CSV
  • Other
Other data import formats JSON

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability The solution is hosted on the Microsoft Azure platform and as such we are able to offer availability of 99.99%. Where we do not meet that availability we will offer clients a 25% credit on the daily charge.
Approach to resilience The resilience of our solution is provide though our investment in the Microsoft Azure platform on which our solution is built.
Outage reporting Any outage issues will be reported to clients by email.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password
Access restrictions in management interfaces and support channels Access to management and support channels is limited by the permissions layers we apply to users. Currently only two members of our team are able to change user permission and have access to the management interface.
Access restriction testing frequency At least every 6 months
Management access authentication 2-factor authentication

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 BSI Certificate IS671379
ISO/IEC 27001 accreditation date 23/02/2018
What the ISO/IEC 27001 doesn’t cover The certification covers all our client facing services and our internal use of hardware and software.
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications Cyber Essentials

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes Our Information Security Policy has six distinct strands:
Information | Information is valuable; classifying information as ordinary, confidential, restricted and personal enables us to better protect it. Ordinary being in the public domain restricted and personal being confidential to our clients, partners or staff.
Encryption | a powerful data security tool, deployed on all devices, we also ensure devices can be remotely wiped.
Passwords | Nothing guarantees password security. Staff are advised never to share passwords, ensure it is easy to remember but difficult to guess. It must contain upper and lower case letters, numbers and symbols and are changed every quarter.
Software | we ensure all software is industry standard, with robust update schedules. Only using Microsoft, Apple, Adobe and Norton software, with apps only procured from Apple’s App store.
Cloud | as providers of cloud services we treat security with utmost importance and have followed Microsoft’s advice to the letter deploying appropriate multi factor authentication and additional security.
Hardware | hardware is configured to lock 3 minutes after last use, staff are advised to lock computers when away from them. Cloud services removed the need to transfer data via media as such we restrict external media access.

Operational security

Operational security
Configuration and change management standard Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach We have a clear change management process developed with our development team who utilise a sandbox environment to test any solution before deployment. The six-step process is as follows: Identify | what is the change required? Define | what does this change mean for the current solution, security and services? Develop | how will the change be delivered, what will it look like and how much will it cost? Approve | Director approval of change Deploy | technical lead deploys solution to sandbox solution for approval Review | Director and technical lead review prior to deployment in live environment.
Vulnerability management type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach We utilise the inbuilt protection offered by the Microsoft Azure platform to protect our cloud offering, which provides: Antimalware | protecting our cloud services, virtual machines, and Windows clients helping identify and remove viruses, spyware, and other malicious software, it also provides real-time protection, on-demand scanning, basic configuration management, and monitoring. Denial-of-service defences | protecting our servers against attacks using multiple machines trying to flood the resources of our servers. Advanced Threat Analytics | technology monitoring normal networks, systems, and users usage patterns, and employs machine learning to flag abnormal behaviour. Updates and patches are therefore managed by Microsoft.
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach Our servers run on the Microsoft Azure infrastructure, and uses the threat management protections that are built into Azure. Azure Security Centre provides a centralized portal from which we secure our Azure deployments and prevent, detect, respond to threats, and increase visibility into the security of our Azure resources. The Azure Security Centre also provides focused security recommendations and rapid deployment of integrated partner technologies. It uses behavioural analytics and machine learning for effective threat detection and helps you build an attack timeline for faster remediation. This means that we are able to resolve issue in under 24 hours.
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach We do not have pre defined process at this stage for the bespoke solution however as we our servers run on the Microsoft Azure infrastructure, and uses the incident management tools that are built into Azure platform. This means that we are able to resolve issue in under 24 hours and reports are provide to end users vis email.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No


Price £500 per unit per year
Discount for educational organisations Yes
Free trial available Yes
Description of free trial We provide a demo site of outcomes and will undertake pilots with existing survey data.

Service documents

Return to top ↑