Infinity Gate

DataFoundry - Big Data, Data Management & Visual Analytics in the Cloud

Infinity Gate's DataFoundry provides a holistic on demand cloud analytics service that is powered by SAS Data Management & SAS Visual Analytics. Available on a pay as you go basis and deployed in AWS, Azure or Carrenza Private Cloud, DataFoundry can save over 80% on Traditional Core License Model.


  • Advanced Data Collection
  • Data Management
  • Master Data Management
  • In-Memory Analytics
  • Advanced Analytics & Modelling
  • Statistical Forecasting
  • MI and BI Reporting
  • ETL & Data Integration
  • Hadoop
  • Massively Parallel Processing


  • 80% Reduction in traditional licensing
  • On-demand access to tooling
  • Built-in Analytics
  • Click and drop reporting - no coding
  • Mobile platform BI delivery
  • Stunningly fast visualisations on billions of rows of data
  • Get to all of your data, all of the time
  • Reduce analytical lifecycle time
  • Reduce risk of bad data or stale results


£7500 to £13500 per unit per month

  • Free trial available

Service documents

G-Cloud 9


Infinity Gate

Stephen Holt

07590 287835

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Public cloud
Service constraints Usually UK Business Hours for support but the service is available 24x7x365 for usage.
System requirements
  • Data integration supports as a minimum XML or .net 2.0
  • Visual Analytics requires a fully modern browser

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Within 4 hours UK Business Hours
Out of hours and weekend support is dependent on the support pack purchased
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels UK Business Hours 9-5, Monday to Friday is within the service price.
UK 9-5, 7 days a week or extended hours is an additional £30,000 per year
Account manager is provided as part of the service charge
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Documentation is provided on how to use the service. If required then training courses, including web content and instructor led classes can be purchased.

The visualisation and analytics side has built in analytics functions that are click and drop from the visual interface. Whilst we assume that users have had some experience with these types of tools, it is not necessary.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction Where data is analysed in memory the only 'data' that is at rest within the platform would be the reports that have been created for MI/BI purposes. Infinity Gate will provide a copy of this content to the customer before deleting the customer instance.

If the advanced data collection service is procured then a forensic log store and a database resides within the customer instance of the service. Infinity Gate will work with the customer to archive and remove the data before the service instance is deleted,
End-of-contract process Within the price:

MI/BI Data is removed
Instances are shutdown and deleted inline with customer guidelines.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 10+
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install Yes
Compatible operating systems Windows
Designed for use on mobile devices Yes
Differences between the mobile and desktop service The service is delivered through a web browser that must be able to support modern web technologies like HTML 5.0

There is a windows client that is used to load and manage data however this is run within our cloud on a RDS service, unless you wish to install the client on a local machine and access the service from a PSN or private leased line connection.

The mobile apps are downloaded from the Apple Appstore and Google Play. These apps are primarily there to enable mobile and tablet delivery and interactions with visualisations and reports.
Accessibility standards WCAG 2.0 AA or EN 301 549
Accessibility testing SAS Visual Analytics Home Page, SAS Visual Analytics Explorer, SAS Visual Analytics Designer, and SAS Visual Analytics Viewer 7.3 have been tested against the accessibility standards for electronic information technology that were adopted by the U.S. Government under Section 508 of the U.S. Rehabilitation Act of 1973 (2008 draft proposal initiative update). It was also tested against Web Content Accessibility Guidelines (WCAG) 2.0 levels A and AA, part of the Web Accessibility Initiative (WAI) of the Worldwide Web Consortium (W3C).

We recommend the following software for a better experience using our products with assistive technologies:
On mobile devices, use VoiceOver with Safari on iOS 8 or later.
On Mac, use VoiceOver on OS X or later.
On Microsoft Windows, use the latest available version of JAWS.
What users can and can't do using the API Users have full access to the service's REST API's. These are accessed from the Data Management Studio Client and then pushed to the DataFlux Management Server; an instance is given to each data management user that is procured with the service.

There are three types of REST API's:
- Batch
- Real-time Data Job
- Real-time Process

Each of these API's are executed by Users either designing custom batch jobs, real-time jobs or processes in the design studio function and then having them pushed for execution onto the dataflux server.
API documentation Yes
API documentation formats
  • HTML
  • PDF
API sandbox or test environment No
Customisation available Yes
Description of customisation The service provides for the ability for each customer to have access to the data management, advanced data collection, analytics, visualisation and MI/BI reporting services.

Unless the customer wishes Infinity Gate to create a blacked box managed service, then the customer has full control over what analytical models, data, processes they create to deliver on a business outcome.

Although coding is not required, the service allows for custom R-Code or Python to be injected into the service to achieve specific results.


Independence of resources Each service customer runs its own resource isolated instance that has resource auto-scaling and guaranteed IOPS


Service usage metrics Yes
Metrics types This is only at the platform and bandwidth level.

As a user of the service you have a the ability to monitor and analyse the performance of your data sources, ETL, integration processes as needed to support your business outcomes.
Reporting types Reports on request


Supplier type Reseller providing extra features and support
Organisation whose services are being resold The DataFoundry Analytics Platform is powered by SAS Products

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest Physical access control, complying with CSA CCM v3.0
Data sanitisation process Yes
Data sanitisation type Explicit overwriting of storage before reallocation
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach Data can be exported in a number of ways if this is required. Usually a SAS/ACCESS engine is selected as part of the service boarding. These access engines allow of import and export of data on a huge list of database types such Teradata • Aster Data • Cloudera Impala • Pivotal Greenplum • IBM PureData System for Analytics, powered by Netezza technology • Vertica • SAP HANA • DB2 • Oracle and Oracle Exadata • Microsoft SQL Server • MySQL • SAP ASE and SAP IQ • Amazon Redshift • ODBC • OLE
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats
  • SQL
  • Txt
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats SAS Access Engines for over 20 different DB types

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability The standard service is single site, or VPC depending on the deployment model (public or private cloud). Each instance is inherently highly available and is provided with snapshot recovery technology.

Where data is transient in memory we do not believe that there is a requirement for cross site / availability zone DR, however this can be implemented if customers require it.

If the advanced data collection option is taken then the collectors, agents and database technology guarantees delivery and availability of data.

Where a service is interrupted for a period longer than 12 business hours, Infinity Gate will agree a service credit scheme with the customer.
Approach to resilience This information is available on request.
Outage reporting The service is monitored 24x7x365 from a infrastructure services point of view. Outages are delivered to the Infinity Gate service desk, where alerts are categorised and responded to.

Email Alerts are generated to the service users during any outage.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • Public key authentication (including by TLS client certificate)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels Access to management is only allowed for Infinity Gate support staff. All access to these systems is vetted and then provided using RBAC and NCSC aligned controls in regards to Management.

Third Party suppliers such as vendors adhere to these controls and are restricted their allowed areas of access.
Access restriction testing frequency At least once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information You control when users can access audit information
How long supplier audit data is stored for Between 6 months and 12 months
How long system logs are stored for Between 1 month and 6 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security accreditations No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance accreditation Yes
Security governance standards ISO/IEC 27001
Information security policies and processes ISO27001 Aligned

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Our configuration and change management processes are ITIL aligned. Planned changes to the services are in a roadmap which includes upgrades to software and any key infrastructure services.

Tests in pre-production and development environments are there to ensure that patches and upgrades meet a stringent criteria and do not cause any impact to the customer experience.

Unplanned changes are deployed as part of our incident response processes and are always tested in non-live before being rolled out to the live services
Vulnerability management type Supplier-defined controls
Vulnerability management approach Infinity Gate have a Cyber Consulting department that integrate with our manage services team, called IG Cyber. IG Cyber run scheduled vulnerability assessments for the services that are deployed across the company.

Where threats and other issues are found a risk treatment plan is created and implemented into our change management processes.

Where we resell third party software, Infinity Gate also integrates with its vendor security processes and will deploy high / critical security patches immediately.
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach Infinity Gate have managed service for protective monitoring and vulnerability assessment, along with a SOC that manages all of our infrastructure.

How this works and what the processes we use to continuously monitor and alert can be made available on request.
Incident management type Supplier-defined controls
Incident management approach Incidents are managed through our helpdesk system. Customers have access to this via our helpdesk line.

Once a call is logged it is assessed for priority and then responded to against the service criteria.

Reports are available by email.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks Yes
Connected networks
  • Public Services Network (PSN)
  • New NHS Network (N3)


Price £7500 to £13500 per unit per month
Discount for educational organisations No
Free trial available Yes
Description of free trial There is a limited 1 month trial to the data management and visualisation services. This is limited to:

1 data source
1 data management user
1 report creator
5 report consumers

Data is limited to 100GB initially.


Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑