BIZ Analytics

Cloud Data Experts

Cloud Data engineering in cloud, we provide one stop solution for analysis, migration, analytics or for any purpose data cleansing, data engineering, data science - entire data service in the cloud using AWS, Google and Azure with top notch data protection and security of data in place.

Features

  • Process data from anywhere
  • Access your data anywhere
  • Fully encrypted your data from source to target
  • Ease of processing
  • Voice commands
  • Data protection compliant
  • Disaster recovery
  • Load balancing
  • Highly scalable
  • Customizable

Benefits

  • Analyse any KPI required based on your data
  • Removes maintenance and IT overheads
  • Your database migrated to Cloud of your choice
  • Get data is as clean and integrated as required
  • Protect your data at highest standard
  • Let you migrate your applications to cloud
  • Let you focus more other than IT
  • Publish contents from any mobile or non-mobile device
  • Manages contents and office on move
  • Provides cloud based web application

Pricing

£9000 to £500000 per transaction per month

  • Education pricing available
  • Free trial available

Service documents

G-Cloud 10

762266298934495

BIZ Analytics

Chetna Verma

01932781576

sales@bizanalytics.co.uk

Service scope

Service scope
Service constraints All our services are based on cloud and open source software technologies ,We use AWS, AZURE and Google Clouds . Our server uptime are dependant on these major providers uptime.
System requirements
  • Latest Web browser
  • Data in CSV, JSON, Database or XML
  • Software Licences of your own
  • Jira software to manage any change
  • Confluence for documentation
  • Version management tools

User support

User support
Email or online ticketing support Yes, at extra cost
Support response times On Weekends,

On Weekends, We support personally only very important tickets, otherwise automated supports are provided.Following is the default SLA of weekend, unless special SLA agreed with buyer.

If Priority 1 tickets - 4-6 hrs. Upon receiving email followed by call.

On Weekdays Default SLA's are:
Priority 1 : 2-4 hrs
Priority 2 : 4-8 hrs
Priority 3 : 2-3 days
Priority 4 : 1 Week
User can manage status and priority of support tickets Yes
Online ticketing support accessibility WCAG 2.0 A
Phone support Yes
Phone support availability 9 to 5 (UK time), 7 days a week
Web chat support Web chat
Web chat support availability 24 hours, 7 days a week
Web chat support accessibility standard WCAG 2.0 A
Web chat accessibility testing Yes, It has been tested with most of scenarios.
Onsite support Yes, at extra cost
Support levels We provide extensive support including training, development, design, deployment, customising, assisting buyer to buy similar service, working along with the buyer.

Cost of support are not fixed, Its fully dependant on the nature of the support required and how long it takes to develop or resolve. however guide rate are £400-700/day

We provide cloud support engineer.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started We provide documentation, online training and also upon request onsite training.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction By default, We provide data in CSV format and also assist users in migrating to newer platform if required.

However upon request, we do provide Json, XML or database file format.
End-of-contract process At the end of contract, We provide all the buyers data in the default format or in any requested format. And we delete all of customers data upon final agreement with customer.

We do ensure, we don't retain any of buyers data other than legally and commercially required, however it's disclosed and agreed with user, what kind of information will be retained.

Using the service

Using the service
Web browser interface Yes
Using the web interface Once buyers have signed up our services, we provide them web link with activation instructions.

Lead/Admin/organisation users are allowed to add and remove extra users

There are some limitations on what users can/can't do. We do have role based management that can restrict users - what and how much they are restricted ?
Web interface accessibility standard WCAG 2.0 A
Web interface accessibility testing We have done automatic testing of our application to provide equal opportunity to assistive technology users.
API No
Command line interface No

Scaling

Scaling
Scaling available Yes
Scaling type
  • Automatic
  • Manual
Independence of resources We Configure separate VPC and virtual machine to every business. every business are using there own private environment in the cloud. We do provide matrix and analytics of uses. It's always pre-agreed with customer if auto scaling is required to be configured for their application. It's mostly used when customer need to run some specific marketing camping that can surge the demand.
Usage notifications Yes
Usage reporting
  • Email
  • SMS
  • Other

Analytics

Analytics
Infrastructure or application metrics Yes
Metrics types
  • CPU
  • Disk
  • HTTP request and response status
  • Memory
  • Network
  • Number of active instances
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency Less than once a year
Penetration testing approach ‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest Encryption of all physical media
Data sanitisation process Yes
Data sanitisation type
  • Deleted data can’t be directly accessed
  • Hardware containing data is completely destroyed
Equipment disposal approach A third-party destruction service

Backup and recovery

Backup and recovery
Backup and recovery Yes
What’s backed up
  • Files
  • Virtual machines
  • Application
  • Databases
Backup controls Backups are standard and it's automatic process; it's part of our offering. It can be tailored to users specific requirements.
Datacentre setup Multiple datacentres with disaster recovery
Scheduling backups Supplier controls the whole backup schedule
Backup recovery
  • Users can recover backups themselves, for example through a web interface
  • Users contact the support team

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability Our availability is inline with AWS, AZURE and Google Cloud's availability 99% availability

We would refund automatically reasonable fee on pro-rata bases; if service is not available in agreed SLA.
Approach to resilience We do configure every buyer's VPC in multiple availability zone in UK and if feasible UK & EU
Outage reporting Email alerts and Dashboard

Identity and authentication

Identity and authentication
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google apps)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels We follow role based approach, separate management VPN, including management interface commands to restrict access in management interfaces and support channels.
Access restriction testing frequency At least every 6 months
Management access authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
Devices users manage the service through Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach We set and manage accountability and decision rights with the Data governance Officer
Assign and asses acceptable risk
Enable risk control
Assure control effectiveness
Information security policies and processes Policies and processes:
1. Information will be protected in line with all relevant GDPR policies and legislation, notably those relating to data protection, human rights and freedom of information.
2. Each information asset will have a nominated owner who will be assigned responsibility for defining the appropriate uses of the asset and ensuring that appropriate security measures are in place to protect the asset.
3. Information will be made available solely to those who have a legitimate need for access.
4. All information will be classified according to an appropriate level of security.
5. The integrity of information will be maintained.
6. It is the responsibility of all individuals who have been granted access to information to handle it appropriately in accordance with its classification.
7. Information will be protected against unauthorised access.
8. Compliance with the Information Security Policy will be enforced.

More detailed policies and processes are available upon request.

Operational security

Operational security
Configuration and change management standard Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach Configuration management comes after a project baseline is set. Once the project has been defined, configuration management does the following:

1. Evaluates each system, resource, and component of the project.
2. Coordinates who will approve or disapprove change and what processes will be utilised to configure change.
3. Coordinates who will ensure changes are realised along with accountability.
4.Coordinates who will implement or request the change
5. Provides documentation, or a library of sorts, specific to project on how controls were set, defined, implemented and documented.
Vulnerability management type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach Our vulnerability management process consists of five phases:
1. Preparation
2. Vulnerability scan
3. Define remediating actions
4.Implement remediating actions
5. Rescan

We deploy patches asap, mostly within 24-48hrs

Once the scan is complete, scan results are available through the “Reports” this is how we get if vulnerabilities have been detected in our system
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach We collect, monitor and act on timestamped logs, generate alerts on suspect, record data back up status, record suspicious activities, network statistics, VPN connection monitoring and provides system audit reports
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach Our Incident management process:
1. Incident identification
2. Incident logging
3. Incident categorisation
4.Incident prioritisation
5.Initial diagnosis
6.Escalation, as necessary, to level 2 support
7.Incident resolution
8.Incident closure
9.Communication with the user community throughout the life of the incident

We have online system to report incident and check progress of it.

We have incident dashboard which can give insight of any Incident.

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Separation between users

Separation between users
Virtualisation technology used to keep applications and users sharing the same infrastructure apart Yes
Who implements virtualisation Supplier
Virtualisation technologies used Hyper-V
How shared infrastructure is kept separate Private cloud service or Penetration testing

Energy efficiency

Energy efficiency
Energy-efficient datacentres Yes

Pricing

Pricing
Price £9000 to £500000 per transaction per month
Discount for educational organisations Yes
Free trial available Yes
Description of free trial What's included:
1. Requirement gathering
2. Prototyping the solution - tailer made

What isn't included:
1. Trial only with dummy or public data

Time Period:
1 Month

Documents

Documents
Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑