Ez Analytics
EZ Analytics is a population health management tool which integrates complex data from any data source, into user friendly information.
This platform enables decision support, helping clinicians/non-clinicians to easily identify areas which require optimisation at all population scales. EZ Analytics lets users view performance at individual practice level.
Features
- Dynamic and flexible reports on over all business performance
- Business Intelligence dashboards for real-time patient management
- Data quality and monitoring
- Population health risk management
- Income analysis and forecasting
- Enterprise performance data repository solution
- Health Immunization Stats
- Insights from Clinical Data
- Work force performance data
- insights from different survey data and website stats
Benefits
- Self-service Business Intelligence platfrom
- Long Term condition management
- Digital first approach for care providers
Pricing
£0.20 to £1 a person
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 12
Service ID
5 3 1 9 0 1 8 6 8 2 0 0 4 6 2
Contact
AT Technology Services Ltd
Hasib Aftab
Telephone: 07989557863
Email: hasib.aftab@attech-ltd.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- Is used as an extension for in house clinical applications
- Cloud deployment model
- Private cloud
- Service constraints
-
Once a product is bought by a customer. There is a time in the contract before handing over the product to the customer
There can be unforeseen downtime but there is no scheduled downtime - System requirements
-
- Tailored Solution for customers
- Works on all web browsers
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Initial response time: Within 1 hour during weekdays on average
Follow up: 24hrs
Case resolution: 24 hrs to 48 hrs during weekdays on average. For weekends it can take up to 48 hrs to 72hrs - User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web chat accessibility testing
- N/A
- Onsite support
- No
- Support levels
- Customised Service Level Agreement with each customer
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Onsite training, workshops, virtual training and videos, and materials
- Service documentation
- Yes
- Documentation formats
-
- ODF
- End-of-contract data extraction
- We provide option of data extraction or data wipe. But Data is passed onto clinical system which negates the reasons for data extraction
- End-of-contract process
- Built into the contract.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari 9+
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Web-based service optimised for Mobile. Can only be accessed through the mobile web browser
- Service interface
- Yes
- Description of service interface
- Use API centric approach and able to integrate with other services
- Accessibility standards
- WCAG 2.1 AAA
- Accessibility testing
- We have dedicated QA team
- API
- Yes
- What users can and can't do using the API
- This is done via our technical team. A user cannot make any changes using the API endpoint
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- Other
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
Based on customer requirements the service can be localised and personalised
A user can request to manipulate the data set that they provide
Customised report generation
Customised user access management and role-based access
Scaling
- Independence of resources
- We have a scalable and highly available cloud-based application running on AWS servers.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Through our dedicated analysis reporting tool
- Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2012
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- User can generate reports from system interface, based on the user profile
- Data export formats
-
- CSV
- Other
- Other data export formats
- Excel
- Data import formats
-
- CSV
- Other
- Other data import formats
- Excel
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- Core Hours Availability - 99.9%
- Approach to resilience
- Available on request.
- Outage reporting
- Email Alerts are sent out to our customers
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- This product is a fully governed platform. Role-based access policy in place and it is administrated centrally by the company. support channels or end-user are restricted to make any changes.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- Public key authentication (including by TLS client certificate)
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- 215269
- ISO/IEC 27001 accreditation date
- 14/08/2019
- What the ISO/IEC 27001 doesn’t cover
- The scope of our certification is developer and delivery of digital patient-centric solutions, software development, mobile applications, proprietary analytics, bespoke health technology application, population health systems and tools, data migration to the healthcare industry within the UK
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Other security certifications
- Yes
- Any other security certifications
-
- Cyber Essentials
- DSP Tool kit
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
All Data Protection and Security Toolkit policies
Compliant with NHS GPSoc bulk data extraction services
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Product or business road maps
Readiness assessments
Training Tutorials and Education Sessions
Stakeholder Feedback gathering and review
Post-deployment review
Performance measures and analytics
Change management risk analysis
Continuous Improvement Plan
Business case studies and knowledge management - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Real time threat monitoring systems.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Based on service level agreements with customers - commercially approved audit tools are used to monitor processes
- Incident management type
- Supplier-defined controls
- Incident management approach
-
Performing rout-cause analysis
Initial risk assessment forms and frameworks
Communication matrix with key people
Gathering evidences and documentation
Taking approach to minimise the risk or further damage
based on customer agreement - predefined processes and tools used for incident management
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
-
- Public Services Network (PSN)
- NHS Network (N3)
- Health and Social Care Network (HSCN)
Pricing
- Price
- £0.20 to £1 a person
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Subject to request