This is a data platform you can use to provide your organisation with real-time analytics and reporting across data sources and types. Create a single data view across source systems in a fully integrated and monitored environment regardless of how disparate your source data is to run robust auditable analytics.
- Ease of deployment through software-defined infrastructure
- Easily connect existing Business Intelligence, Reporting and Visulisation tools
- Role-based security credentials
- Leverage best-in-class open-source software components
- Push down query capability run against native source systems
- Seamless retarget across different cloud offerings or from on-premise
- Data virtualization across databases and other existing data silos
- Create a single data view, run analytics across departments/systems/geographies
- De-risk and simplify the adoption/management of open-source software environments
- Streamline and reduce costs of existing commercial databases
- Make the output from analytics projects easily consumable
- Accelerate exploratory analytics projects and manage business analytics workflows
£3666 to £12500 per unit per month
- Education pricing available
|Service constraints||Planned maintenance is typically scheduled during Analytics Engines support hours.|
|System requirements||1. CentOS or Red Hat OS operating systems|
|Email or online ticketing support||Email or online ticketing|
|Support response times||Response to support emails are typically within 1 working day (normally within 1 hour).|
|User can manage status and priority of support tickets||No|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||No|
|Onsite support||Yes, at extra cost|
|Support levels||Analytics Engines provides full support for the service, from level 1 to level 3. As a small company, we do not specifically stratify the support levels, although we do provide a technical account manager to oversee and manage the engagement.|
|Support available to third parties||No|
Onboarding and offboarding
|Getting started||User documentation is provided. Onsite training can be provided upon request.|
|End-of-contract data extraction||The data stored in XDP can be downloaded or exported from XDP. Users can do this through web interfaces, the command line interface or by using other data migration tools.|
|End-of-contract process||At the end of the contract, the buyer should either renew their license with Analytics Engines or they should remove the service and provide Analytics Engines with confirmation that the service has been removed.|
Using the service
|Web browser interface||Yes|
|Using the web interface||XDP provides a number of web interfaces, depending on the platform configuration. The web interfaces are to the deployed applications, data stores and computation frameworks that have been installed in XDP. Examples of what users can do using the web interfaces are: to view and query data, to view and query data jobs that are running (or have run) on XDP, to view and query monitoring data.|
|Web interface accessibility standard||None or don’t know|
|How the web interface is accessible||The web interfaces provided by XDP are typically open-source and/or third party web interfaces that provide users with interfaces to the various tools and technologies installed within XDP. Analytics Engines has tested the interfaces for accessibility. Most interfaces provide accessibility by ensuring non-text content has a text alternative, functionality of content is operable through a keyboard interface, and web pages can be navigated with focusable components receiving focus in an order that preserves meaning.|
|Web interface accessibility testing||None|
|Command line interface||Yes|
|Command line interface compatibility||Linux or Unix|
|Using the command line interface||
The command line interface allows users to interact with the XDP deployment.
Using the command line interface, users can ssh on to XDP, query XDP for certain deployment information, check the status of XDP, and transfer files to XDP.
|Independence of resources||
Each customer has their own deployment of XDP.
Within a given XDP deployment, user quotas can be specified against select data stores and where necessary workload isolation can be configured.
|Infrastructure or application metrics||Yes|
|Supplier type||Not a reseller|
|Staff security clearance||Staff screening not performed|
|Government security clearance||Up to Security Clearance (SC)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||United Kingdom|
|User control over data storage and processing locations||Yes|
|Datacentre security standards||Supplier-defined controls|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||In-house|
|Protecting data at rest||Encryption of all physical media|
|Data sanitisation process||Yes|
|Data sanitisation type||Deleted data can’t be directly accessed|
|Equipment disposal approach||A third-party destruction service|
Backup and recovery
|Backup and recovery||Yes|
|What’s backed up||
Users should specify their backup requirements to Analytics Engines at the start of the contract. Analytics Engines will configure the backup.
In the case of a public cloud deployment, backups are saved on the cloud provider's storage service.
In the case of a private cloud deployment, backups are saved on storage provided, configured and maintained by the customer.
|Datacentre setup||Single datacentre|
|Scheduling backups||Users contact the support team to schedule backups|
|Backup recovery||Users contact the support team|
|Data protection between buyer and supplier networks||
|Data protection within supplier network||TLS (version 1.2 or above)|
Availability and resilience
High-Availability can be provided on demand based on customers specific application demands.
In the event of a fault within XDP, Analytics Engines will provide a response from front line support within 1 business day (Normal response time is 1 hour) outlining resolution steps.
Events are expected to be resolved within 1 business day of resolution plan.
In the event of a resolution not being made available within the above timeframe a 10% credit on following months’ service for every day of failure beyond planned resolution time will be provided.
This SLA covers the XDP software platform. This SLA does not cover services provided by the customer that XDP utilises (e.g. Cloud/Server infrastructure, API availability, DB access, etc.).
This SLA does not cover Incidents caused by User’s negligence, abuse, misapplication or use of the XDP service other than as specified in the XDP Service Description or other causes beyond the control of XDP.
|Approach to resilience||
XDP installation and configuration is completely automated through
Software Defined Infrastructure. In the event of a catastrophic system failure the complete system can retargeted to a new environment (Cloud, virtual machines, etc) and be redeployed from the system definition. This process typically takes 2 hours to complete at which point backup data can begin to be loaded.
XDP uses Data Virtualisation to minimise the data persisted in the XDP platform. A minimal footprint of data is stored within XDP which must be backed-up following the business unit policies for the configuration of XDP. In the event of a backup recovery being required the backup data is used to re-populate XDP to the previous backup snapshot.
|Outage reporting||XDP includes a monitoring component. The monitoring component provides a dashboard that users can log into to see reports and charts regarding service availability and any outages. Email alerts can be configured.|
Identity and authentication
|Access restrictions in management interfaces and support channels||Management interfaces require authentication in the form of either username/password or public key authentication.|
|Access restriction testing frequency||At least once a year|
|Management access authentication||
|Devices users manage the service through||
Audit information for users
|Access to user activity audit information||Users contact the support team to get audit information|
|How long user audit data is stored for||User-defined|
|Access to supplier activity audit information||Users contact the support team to get audit information|
|How long supplier audit data is stored for||User-defined|
|How long system logs are stored for||User-defined|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security accreditations||Yes|
|Any other security accreditations||Cyber Essentials|
|Named board-level person responsible for service security||Yes|
|Security governance accreditation||Yes|
|Security governance standards||Other|
|Other security governance standards||
We are accredited with Cyber Essentials.
We adhere to ISO 27001 standards and processes. Our next ISO audit is due May 2017.
|Information security policies and processes||
Analytics Engines has a policy manual in place which demonstrates how the company meets the requirements of the Information Security Management System – ISO 27001. It includes the policy, responsibilities, and acts as a signpost to related system documentation.
Policy and Procedure Documents
Policy and Procedure Documents have been prepared to cover situations where their absence could lead to deviations from the company’s Information Security objectives and would introduce or elevate Information Security risks to unacceptable levels. These include: Access Control Policy, Backup and Restore Policy, Capacity Planning Policy, Change Management Policy, Credential Management Policy, Data Encryption Policy, Data Retention & Destruction, Document Control Policy, Human Resources Security Policy, Incident Management Policy, Logging and Monitoring Policy, Malware Control Policy, Patch Management Policy.
Analytics Engines has an ISMS owner who is responsible for the day-to-day tasks of ISO 27001. Ultimate responsibility of the system lies with the Directors of the company. We have assigned IT team members who deal with technical tasks on a daily basis.
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||Service components are versioned and kept under source control in private software repositories. Any changes to service components are subject to review and functional regression testing prior to release.|
|Vulnerability management type||Undisclosed|
|Vulnerability management approach||Vulnerability management patching follows ISO 27001 processes. Potential threats to the XDP service are identified through a variety of means: including regular Penetration Testing, subscription to industry standard threat information system vulnerability listings, and regular OS and software level release information.|
|Protective monitoring type||Undisclosed|
|Protective monitoring approach||The service collects relevant accounting and audit information. Administrators can examine the audit information and in the case of finding any suspicious activity request support from Analytics Engines for further investigations.|
|Incident management type||Undisclosed|
|Incident management approach||Incident management events are captured following an ISO27001 policy. Users have a specified contact for incident management reports. Once investigations into an event are concluded a report is generated which can be provided to the user.|
|Approach to secure software development best practice||Conforms to a recognised standard, but self-assessed|
Separation between users
|Virtualisation technology used to keep applications and users sharing the same infrastructure apart||Yes|
|Who implements virtualisation||Supplier|
|Virtualisation technologies used||Other|
|Other virtualisation technology used||
Where XDP is deployed on-premise, it is installed on either bare metal machines or virtual machines that have been virtualised using the buyer's virtualisation technology.
Where XDP is deployed on public cloud, it is installed on virtual machines using the cloud provider's virtualisation technology.
XDP can be deployed on infrastructure virtualised using VMWare, Hyper-V, Citrix XenServer, Oracle VM, Red Hat Virtualisation or KVM.
|How shared infrastructure is kept separate||
XDP is deployed as an analytic platform for use by a specific organisation.
XDP is not deployed as a multi-tenant platform.
In cases where XDP is deployed on public cloud for an organisation, they are kept apart from other organisations running applications on the same public cloud by the cloud provider’s virtualisation and isolation technologies.
XDP utilises strict firewall policies that restrict network traffic through whitelist specifications.
|Price||£3666 to £12500 per unit per month|
|Discount for educational organisations||Yes|
|Free trial available||No|
|Pricing document||View uploaded document|
|Skills Framework for the Information Age rate card||View uploaded document|
|Service definition document||View uploaded document|
|Terms and conditions document||View uploaded document|