Amtex Solutions Ltd

WebFOCUS Cloud Express as a Service

WebFOCUS Cloud Express is a G-Cloud business intelligence platform that combines WebFOCUS Express software from Information Builders and a Microsoft SQL Server 2012 data warehouse. The platform runs on Microsoft Windows Server 2012 64 bits and is deployed with Memset IaaS platform that is IL2 compliant and ISO 27001 certified.


  • Data analytics
  • Data storage platform
  • Data exploration
  • Interactive visualisations
  • Dashboards
  • Reports
  • Open API for publishing
  • Time series forecasting
  • Statistical learning, evaluation and visualisation of predictive models
  • Support of Predictive Modeling Markup Language (PMML)


  • 100 percent web-based deployment
  • No additional client hardware or software to install or maintain
  • Wizards for uploading and previewing data
  • A single web-based environment
  • 15x productivity boost compared to scripting and coding
  • Access to all the data across the organisation
  • Access to data via more than 26 pre-built data adapters
  • Visual designer for data integration, enrichment and modeling


£50000 per unit per quarter

Service documents

G-Cloud 9


Amtex Solutions Ltd

Mr. Santhosh Balasubramanian


Service scope

Service scope
Software add-on or extension No
Cloud deployment model Private cloud
Service constraints Cloud Data Storage based on OpenStack The cloud data storage service is based on OpenStack (, which is a collection of open source software developed and supported by a wide range of cloud experts. This gives complete peace of mind as the cloud data storage solution is founded on tried, tested and compatible Object Storage software.
System requirements
  • Permission and support for integration with systems like SAP,Oracle
  • Feed databases for purposes of big data analytics and visualisation

User support

User support
Email or online ticketing support Yes, at extra cost
Support response times Categories of subscription response times based on requirement.
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support No
Web chat support No
Onsite support Yes, at extra cost
Support levels 3 Levels Gold, Silver and Bronze.
Cost depends upon overall requirement, number of users, response times etc.
Yes, a technical account manager or cloud support engineer will be provided.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Any of the following could be provided on request : onsite training, online training, or user documentation.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction Dependant on setup and requirement FTP link could be provided.
End-of-contract process After termination, in addition to performing the Consulting Services contracted by Client, at Client's sole discretion Supplier shall also assist with all transition work, for a mutually agreed to time period, which includes but is not limited to the following: the planning, knowledge transfer and implementation of turning over of all Consulting Services from Supplier to Client or to its designee.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 10+
  • Chrome
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Optimised for Mobile devices depending on browser
Accessibility standards None or don’t know
Description of accessibility Browser access
Accessibility testing None
What users can and can't do using the API Open API for publishing.
API documentation No
API sandbox or test environment Yes
Customisation available Yes
Description of customisation Can setup user grade access. (eg. Basic, Advanced, Adminstrator etc)


Independence of resources This load factor will be discussed with Buyer before setup of services and hence avoiding any performance issues.


Service usage metrics Yes
Metrics types Customisable to very specific requirements like Number of active users, Report numbers etc
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • Other locations
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach In-house
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach Depending on user requirement, CSV file, PDF etc could be setup.
Data export formats
  • CSV
  • Other
Other data export formats Pdf
Data import formats
  • CSV
  • ODF

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability The big data analytics service data storage is based on datastax enterprise platform deployed on il-2 compliant UK secure private cloud with 99.995% uptime guarantee.
Approach to resilience Details available on request with specific requirements established between buyer and supplier.
Outage reporting Outages could be reported via various mediums
a public dashboard/ an API/ email alerts

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels 2 level authentication and customisable to buyer requirement
Access restriction testing frequency At least once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security accreditations Yes
Any other security accreditations Our hosting providers are ISO 27001 certified

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance accreditation No
Security governance approach Only vetted personal are allowed access to systems.
Information security policies and processes Company wide standards available on request.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Configuration and change management processes available on request
Vulnerability management type Supplier-defined controls
Vulnerability management approach Continuous monitoring services in place detect any potential threats.
Protective monitoring type Supplier-defined controls
Protective monitoring approach Continuous monitoring services in place detect any potential compromise.
Incident management type Supplier-defined controls
Incident management approach Yes, there are pre-defined processes for common events.
Users report incidents through the Ticketing system with appropriate alert or reach out to the client manager depending on severity.
Incident reports can be made available according to client requirement.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No


Price £50000 per unit per quarter
Discount for educational organisations No
Free trial available No


Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑