CDS

MicroStrategy Cloud

MicroStrategy is a secure Cloud based M.I.S M.I. MIS MI BI reporting solution, designed specifically for the public sector user. Via a simple per user monthly subscription fee, it provides access to the industry’s leading BI platform to deliver intelligent insight and actionable analytics to drive change.

Features

  • No upfront investment or infrastructure required
  • Secure hosted environment ISO27001 certified
  • Create responsive, device-agnostic solutions
  • Support via ITIL and ISO20000 compliant Service Desk
  • Quick and cost effective deployment
  • Expert training by Microstrategy specialists
  • Access to on-boarding experts to support deployment
  • Dedicated testing team certified to ISO20000 service management
  • Hosting via tier 1 provider with 99.9% availability per month

Benefits

  • Access to Microstrategy’s entire BI platform
  • In-depth analysis from the world’s leading BI software
  • Designed to empower non-technical users to explore data
  • Designed to deliver actionable analytics to drive change
  • Scalable based on user and business needs
  • Easy and intuitive to use
  • 1 year term license saves one third of list price
  • Secure handling of sensitive or personal data is assured
  • Accessed via browser, tablet and mobile
  • Quickly see return on investment

Pricing

£2,422 an instance a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at jonathan.astin@cds.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 12

Service ID

7 2 6 6 2 5 0 2 4 6 2 6 8 3 7

Contact

CDS Jonathan Astin
Telephone: 07904 570073
Email: jonathan.astin@cds.co.uk

Service scope

Software add-on or extension
No
Cloud deployment model
Private cloud
Service constraints
N/A
System requirements
The solution requires Microstrategy for mobile (app) or web installed

User support

Email or online ticketing support
Email or online ticketing
Support response times
Included in the service are standard support from 9 to 5.30 Mon-Fri, extensions up to 24x7 available on request. Standard support response times vary between 15 mins and 1 day, depending upon priority. For full details of response times, please refer to the service definition document.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Our standard SLA provides incident response targets based on severity, e.g. P1 loss of service – restoration in 2hrs. We provide 5 support levels ranging from business critical to low priority. For more information, please refer to the attached service description. Access to the service desk is subject to establishing a Support and Maintenance Contract with us. We establish a support contract with a minimum level of provision per month, appropriate to the size and complexity of your project. CDS' Service Desk operates to ITIL standards and is manned by dedicated team of support technicians and experienced developers.
Support available to third parties
No

Onboarding and offboarding

Getting started
On boarding of data will involve an analysis phase. Working with the customer, we will identify the data sources the customer has or wishes to access as part of the proposed solution. Once agreed, CDS will work with the customer to extract data from the identified sources into a number of staging data sources. Based on the required metrics, CDS will create a series of dynamic dashboard reports that will allow the user to gain visual actionable insight.
Training
To support the transition to Cloud based BI solution, CDS and Microstrategy are able to provide a range of training courses.
Introductory training is offered free of charge at Microstrategy’s premises in West London. This is based on joining a “public” training course with other customers.
CDS is also able to provide bespoke training to help support the deployment. All training is “hands-on”, delivered by one of CDS’ experienced BI experts. Training sessions can be delivered either on-site or at one of CDS’ offices in Leeds, Cheltenham or London.
Professionally written user documentation can be provided at an additional cost which will include step-by-step instructions and screenshots of your delivered system.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
Ownership of the data contained in the solution belongs and rests with the client/customer. As the service is decommissioned the data will be extracted in its native format and transferred to the client via trusted hand.
End-of-contract process
The service will cease on the agreed date/time and users will be denied access. All data will be returned to the client in accordance with the specific client contract.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
  • MacOS
  • Windows
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Native app functionality that uses touch, swipe & pinch features are mirrored as closely as possible in the browser version.
Service interface
No
API
No
Customisation available
Yes
Description of customisation
With the necessary skills, dashboards can be created and customised using Microstrategy.

Scaling

Independence of resources
In order to guarantee that users are not affected by the demands from other users, we use resource reservations and shares such as internet bandwidth shaping. In addition, the capacity planning team ensure that usage in terms of all resources are constantly monitored and increased accordingly relating to user demand.

Analytics

Service usage metrics
Yes
Metrics types
User activity. Login date, Login count, activity, job & sessions run etc.
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
.

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
Physical access control, complying with CSA CCM v3.0
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
The software allows for data to be extracted from the desktop solution.
Data export formats
  • CSV
  • ODF
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats
Json

Data-in-transit protection

Data protection between buyer and supplier networks
Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
99% availability during service hours (9am - 5pm Monday to Friday).
Approach to resilience
Available on request
Outage reporting
Email alert via Account Manager channels

Identity and authentication

User authentication needed
Yes
User authentication
Username or password
Access restrictions in management interfaces and support channels
Customers can raise and update support tickets using our interactive online portal and/or email. Access to our portal is by invitation only, and requires a username and password. Interaction by email can be restricted to specific domains, email addresses, or disabled altogether. We also offer access by telephone for urgent requests, and will always attempt to verify the identity of the caller, either using our standard procedure, or one agreed with the customer.
Access to management interfaces are only available from the CDS network.
Access restriction testing frequency
At least once a year
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
BSI
ISO/IEC 27001 accreditation date
05/11/2004
What the ISO/IEC 27001 doesn’t cover
Our certification includes excludes satellite sites.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
Yes
Any other security certifications
Cyber Essentials Plus

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
CDS is certificated to BS EN ISO 27001 – Information Security Management System and registered under the Data Protection Act 1998. (DPA No. Z5255664).
CDS ensures client information is securely maintained through our audited processes and procedures. These are detailed in our SYSOPS which form part of our ISO27001 accreditation which is independently audited twice yearly. Our SYSOPS cover personnel and IT security requirements.
All managers and staff within CDS will take steps to ensure that personal data is kept secure at all times against unauthorised or unlawful loss or disclosure.
CDS employs a dedicated Security manager (ITSM) and runs a Security forum which is chaired by our Managing Director ensuring board level engagement.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
CDS operate a mature Change Management process, which is certified to the ISO 20000 standard. We ensure that all configuration or service changes are put through a controlled Change Management process, to ensure that impact and risk are managed, quality is maintained, and that changes are planned, documented and approved. Impact and risk assessment includes security considerations.
Our Change Register is underpinned by a Configuration Management toolset and process, which charts the lifecycle of configuration items, and allows for them to be linked to service transactions, such as incidents and changes.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
CDS undertake periodic independent pen and vulnerability scanning of our networks and network services. This forms part of our ISO 27001 and Cyber Essentials Plus accreditation.
CDS also undertake vulnerability scanning of client solutions during development and at the point of release.
Nessus scans of the whole environment are performed weekly.
Any identified vulnerabilities are assessed based upon the threat type and business risk. Those issues requiring attention form part of a remediation plan. The individual items are logged and assigned a priority based upon severity and tracked through our ITIL service desk.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
IDS and IPS are in place on firewalls which provide perimeter protection to our networks and are configured to alert on suspicious activity e.g. sql injection, XSS etc.
Logs are also monitored using ManageEngine. Server Logs and Syslogs are harvested to a central reporting server and alerts are in place to notify suspicious activity such as repeated, failed administrator login attempts as well as more sophisticated events indicating exfiltration attempts. Where relevant and appropriate, GPG13 logging is implemented – by way of example we implemented this level of reporting and alerting for the Metropolitan Police.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
CDS operate a mature Incident and Service Request Management process, certified to the ISO 20000 standard. The process is operated by our Service Management tool, which is interactive and can be configured to support the ticket workflow and metrics agreed with customers. Customers can report and update incidents via our interactive portal, email and telephone. Though we operate a core Incident Management policy and process, these can be tailored within customers Service Level Agreements to support common incidents and events. We operate a separate Major Incident Management process, which can provide incident reports, post-mortems etc., when criteria are triggered.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Pricing

Price
£2,422 an instance a year
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at jonathan.astin@cds.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.