Jarmany Ltd

Account Management Intelligence - AMI

Bring all of your account management data into one consolidated, accurate and beautifully presented platform.

Features

  • Fully managed data analytics and reporting platform
  • Combine disparate data sources
  • Provide management information and dashboards
  • Connect to on-premises and cloud data sources
  • Full cleansing and validation of datasets

Benefits

  • One source of the truth
  • Single organisational view of information
  • Platform neutral - Azure, AWS or Google Cloud Platform
  • Free your time to create value-adding insights

Pricing

£0.01 a unit an hour

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at rob.white@jarmany.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 12

Service ID

6 2 3 5 4 4 7 9 9 8 2 9 5 5 1

Contact

Jarmany Ltd Rob White
Telephone: 07826915419
Email: rob.white@jarmany.com

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Cloud-based database and analytics tools
Cloud deployment model
Public cloud
Service constraints
No service contraints
System requirements
Cloud subscriptions - Jarmany can provide

User support

Email or online ticketing support
Email or online ticketing
Support response times
SLAs vary according to the agreed client requirements.
User can manage status and priority of support tickets
No
Phone support
No
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
SLAs vary depending on the agreed client requirements.

All support costs are factored into any monthly management charge.

Support is managed by a central technical team; escalation routes will be provided.
Support available to third parties
No

Onboarding and offboarding

Getting started
Jarmany provide a full range of services from data discovery and audit to initial configuration, setup and management. Training (both on-site and off-site) can be provided along with user documentation.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Jarmany can provide assistance with extracting data at the end of the contract.
End-of-contract process
Upon the termination of a contract, Jarmany will ensure all client data is removed and destroyed and should it be required, will help transfer existing data back to the client.

The cost will depend upon the volume of data and the desired export format.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Mobile-optimised versions of any user dashboards can be created according to client requirements. The exact functionality is determined by the generally replicated from the desktop version though minor reductions in functionality may be necessary due to the reduced screen sizes.
Service interface
No
API
No
Customisation available
Yes
Description of customisation
The general look and feel, as well as the metrics being displayed can all be customised. This is a managed service administered by Jarmany and generally implemented in the initial set up phase after detailed collection of client requirements.

Scaling

Independence of resources
Services run on public clouds which operate at a global scale.

Analytics

Service usage metrics
Yes
Metrics types
Metrics on dashboard usage are available, as well as full transparency on infrastructure costs.
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Microsoft Azure

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Data export is a feature built-in to the tools used to produce the dashboards.
Data export formats
  • CSV
  • Other
Other data export formats
  • Excel
  • PDF
Data import formats
  • CSV
  • Other
Other data import formats
  • Excel
  • Text
  • PDF
  • TSV

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
SLAs are designed to meet the client's requirements so a range or options are available.
Approach to resilience
Jarmany utilises Microsoft Azure datacentre infrastructure. Azure is built upon a global infrastructure. See the following for more details: https://azure.microsoft.com/en-us/global-infrastructure
Outage reporting
A service status portal (https://azure.microsoft.com/en-us/global-infrastructure/) is available as well as pro-active monitoring from Jarmany.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
Jarmany provides a fully managed service so clients would have no admin or management access.

Internally, Jarmany follows the principle of least privilege to ensure access is granted only to those employees necessary.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
Between 1 month and 6 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
BM Trada
ISO/IEC 27001 accreditation date
17/12/2018
What the ISO/IEC 27001 doesn’t cover
Jarmany's ISO27001 certificate covers the full breadth of services that we deliver.

Details on Microsoft's ISO27001 certificate can be found at the following link: https://www.microsoft.com/en-us/trustcenter/compliance/iso-iec-27001
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Being a data and analytics services company, Jarmany’s reputation rests on the secure and confidential handling of our own and other organisations’ and individuals’ data.

Jarmany have been certified to the ISO/IEC 27001:2013 information security standard. This requires Jarmany to develop and maintain a significant number of controls which have been developed to minimise the risk of handling data, both our own and that belonging to clients.

These controls are then subject to a rigorous external independent audit process which determines whether they are fit for purpose and checks whether they are continually being implemented within the company. The certification is valid for three years but is subject to annual surveillance, where the auditors ensure that information security practises are continually being improved. Jarmany passed the annual surveillance checks in both October 2016 and November 2017 and in October 2018, a further full audit was performed and passed.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Jarmany manage configuration and change through a set of internally defined processes which can also be amended to work with our clients' own requirements.

As part of our ISO27001 certification, our change management processes are audited on an annual basis by an independent auditor.
Vulnerability management type
Undisclosed
Vulnerability management approach
Jarmany utilises Microsoft Azure datacentre infrastructure.

Microsoft has its own Security Response Center (MSRC) that also supplies information to all of their customers, covering the whole range Microsoft products.
More information can be found at the following link:
https://www.microsoft.com/en-us/msrc

Microsoft implements technologies to routinely scan the environment for vulnerabilities.
Protective monitoring type
Undisclosed
Protective monitoring approach
Microsoft Azure employs sophisticated software-defined service instrumentation and monitoring that integrates at the component or server level, the datacenter edge, our network backbone, Internet exchange sites, and at the real or simulated user level, providing visibility when a service disruption is occurring and pinpointing its cause.

Proactive monitoring continuously measures the performance of key subsystems of the Microsoft Azure services platform against the established boundaries for acceptable service performance and availability. When a threshold is reached or an irregular event occurs, the monitoring system generates warnings so that operations staff can address the threshold or event.
Incident management type
Supplier-defined controls
Incident management approach
All incidents are raised to Jarmany via phone or email. The incident is then investigated and a fix is either implemented by internal support staff or escalated to Microsoft.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Pricing

Price
£0.01 a unit an hour
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at rob.white@jarmany.com. Tell them what format you need. It will help if you say what assistive technology you use.