MicroStrategy BI for UK Government
Microstrategy for UK Government is a secure Cloud based M.I.S M.I. MIS MI BI reporting solution, designed specifically for the public sector user. Via a simple per user monthly subscription fee, it provides access to the industry’s leading BI platform to deliver intelligent insight and actionable analytics to drive change.
Features
- No upfront investment or infrastructure required
- Secure hosted environment ISO27001 certified
- Create responsive, device-agnostic solutions
- Support via ITIL and ISO20000 compliant Service Desk
- Quick and cost effective deployment
- Expert training by Microstrategy specialists
- Access to on-boarding experts to support deployment
- Dedicated testing team certified to ISO20000 service management
- Hosting via tier 1 provider with 99.9% availability per month
Benefits
- Access to Microstrategy’s entire BI platform
- In-depth analysis from the world’s leading BI software
- Designed to empower non-technical users to explore data
- Designed to deliver actionable analytics to drive change
- Scalable based on user and business needs
- Easy and intuitive to use
- 1 year term license saves one third of list price
- Secure handling of sensitive or personal data is assured
- Accessed via browser, tablet and mobile
- Quickly see return on investment
Pricing
£3,533 a licence a month
- Minimum contract period: Year
- Excluding VAT
Service documents
Request an accessible format
Framework
G-Cloud 8
Service ID
5 0 8 0 7 3 8 9 3 6 2 1 6 4 4
Contact
CDS
Jonathan Astin
Telephone: 07904 570073
Email: jonathan.astin@cds.co.uk
Support
- Support service type
-
- Service desk
- Phone
- Support accessible to any third-party suppliers
- Yes
- Support availability
- CDS Support Desk available 9am-5pm weekdays excluding bank holidays.
- Standard support response times
- Our standard SLA provides incident response targets based on severity, e.g. P1 loss of service – restoration in 2hrs.
- Incident escalation process available
- Yes
Open standards
- Open standards supported and documented
- Yes
Onboarding and offboarding
- Service onboarding process included
- Yes
- Service offboarding process included
- Yes
Analytics
- Real-time management information available
- Yes
Cloud features
- Elastic cloud approach supported
- No
- Guaranteed resources defined
- Yes
- Persistent storage supported
- Yes
Provisioning
- Self-service provisioning supported
- No
- Service provisioning time
- 5-7 working days
- Service deprovisioning time
- 5-7 working days
Open source
- Open-source software used and supported
- No
Code libraries
- Languages your code libraries are written in
-
- N/a
- N/a
API access
- API access available and supported
- Yes
- API type
- RESTful
Networks and connectivity
- Networks the service is directly connected to
- Internet
Access
- Supported web browsers
-
- Internet Explorer 7
- Internet Explorer 8
- Internet Explorer 9
- Internet Explorer 10+
- Firefox
- Chrome
- Safari
- Opera
- Offline working and syncing supported
- Yes
- Supported devices
-
- PC
- Mac
- Smartphone
- Tablet
Certifications
- Vendor certification(s)
-
- EPiServer Premium UK Partner
- EPiServer UK partner of the year 2014
- OpenText Premium UK Partner
- MicroStrategy Premium UK Partner
Identity standards
- Identity standards your service uses
-
- LDAP
- SAML
Data storage
- Datacentres adhere to the EU code of conduct for energy-efficient datacentres
- Yes
- User-defined data location
- Yes
- Datacentre tier
- Uptime Institute Tier 3
- Backup, disaster recovery and resilience plan in place
- Yes
- Data extraction/removal plan in place
- Yes
Data-in-transit protection
- Data protection between user device and service
Asset protection and resilience
- Datacentre location
- Data management location
- Legal jurisdiction of service provider
- UK
- Datacentre protection
- Yes
- Data-at-rest protection
- Secure data deletion
- Other secure erasure process
- Service availability
- 99.9%
Separation between consumers
- Cloud deployment model
- Private cloud
- Type of consumer
- A specific consumer group, eg Police, Defence or Health
- Services separation
- No
- Services management separation
- No
Governance
- Governance framework
- Yes
Configuration and change management
- Change impact assessment
- Yes
Vulnerability management
- Vulnerability assessment
- Yes
- Vulnerability monitoring
- Yes
- Vulnerability mitigation prioritisation
- Yes
- Vulnerability tracking
- Yes
- Vulnerability mitigation timescales
- Yes
Event monitoring
- Event monitoring
- Yes
Incident management
- Incident management processes
- Yes
- Consumer reporting of security incidents
- Yes
- Security incident definition published
- Yes
Personnel security
- Personnel security checks
Secure development
- Secure development
- Yes
- Secure design, coding, testing and deployment
- Yes
- Software configuration management
- Yes
Supply-chain security
- Visibility of data shared with third-party suppliers
- Yes
- Third-party supplier security requirements
- Yes
- Third-party supplier risk assessment
- Yes
- Third-party supplier compliance monitoring
- Yes
Authentication of consumers
- User authentication and access management
- Yes
- User access control through support channels
- Yes
Separation and access control within management interfaces
- User access control within management interfaces
- No
- Administrator permissions
- Yes
Identity and authentication
- Identity and authentication controls
Secure service administration
- Service management model
Audit information provision to consumers
- Audit information provided
- Data made available
Secure use of the service by the customer
- Device access method
- Training
- Yes