Axellera Data Management RAD for Digital Transformation
Empower your teams to on-board, quality assure, manage and govern and distribute decision making data from any source. Move from fragmented data silos and patchy audit-ability and governance to a business wide capability that not only streamlines the way you collect data & reduce risks but empower decisionmakers organisation wide
Features
- quickly find and adapt answers derived from the up-to-date data
- communicate answers to stakeholders through intuitive infographics, dashboards, reports
- onboard vital data quickly with powerful tools that ensure quality
- create powerful user defined workflows assisting collaboration
- create evidence-based decisions that lead to effective action
- create powerful joined-up action by engaging stakeholders deeply
- build a digital knowledge repository with all important answers
- map of communications as they work now and evolve
- ensure actions are consistent communicated with clarity
- Enhance productivity with workflow automation
Benefits
- Rapid evidence based decision making throughout your teams
- Reach beyond your organisation into supplier, customer and other communities
- Capture living organisational and community knowledge
- Make the flow of communications visible and easy to adapt
- Engage deeply by empowering stakeholders with tools and knowledge
- Make on boarding decision making data easy and widely avvailable
- Ensure all decision making data is auditable and well governed
- Automate repeating standardised tasks
- Empower through case based workflows that can be user defined
- Gain insight through predictive analytics
Pricing
£5,000 an instance a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 10
Service ID
7 7 9 5 4 8 8 5 7 2 6 0 3 9 3
Contact
Bancstreet Capital Partners Ltd
Marcelle von Wendland
Telephone: +44 (0) 7801 829 544
Email: mvw@bancstreet.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- Available on Azure, AWS and other G-Cloud listed platforms
- System requirements
- Deployment on G-Cloud listed cloud platforms like Azure and AWS
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Within 1 hour during weekdays or as defined by Individualised SLA
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- We provide a designated contact point as part of our recommended standard support package
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Our service is designed to be extremely easy to use, to the extent that some customers do not feel any need to train their staff to use it. We can however provide training, train-the-trainer support for in-house training, and relevant documentation as needed. Please see our Service Definition and Pricing documents for details
- Service documentation
- Yes
- Documentation formats
-
- HTML
- ODF
- End-of-contract data extraction
- We can provide an extract of the database in PARQUET, SQL, XML, CSV, JSON, ODF and other formats and any stored files in their provided document format. Alternatively, users can directly extract all customer data and files using the service's API
- End-of-contract process
- At the end of the contract customers can use the facilities provided to easily export all their data. We can offer relevant assistance at a cost (see SFIA ratecard) or will facilitate the work of third parties instructed by the customer to conduct any such work.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Chrome
- Safari 9+
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Our mobile service is provided through responsive design. All core features can be used on mobile devices that meet the browser requirements, but certain functions (e.g. where large amounts of data need to be viewed on screen) are best undertaken on a PC or tablet with a suitable screen size
- Accessibility standards
- None or don’t know
- Description of accessibility
- Our service meets substantial parts of the WCAG and EN 301 549 standards but has not been tested fully against these standards. We aim to upgrade accessibility further over the G-Cloud 9 contract period (and we would address any specific issues raised in respect of individual users experiencing difficulties)
- Accessibility testing
- This is planned for Q4 2017.
- API
- Yes
- What users can and can't do using the API
- The service provides a RESTful Application Programming Interface (API) which allows programatic control of any user and service management function. This includes creating, updating and extracting data (all customer data can be extracted or input using the APIs); (ii) creating and modifying queries, process flows, triggers, transformations, layouts and other objects important to system and user experience (iii) programmatic control of system and user management as well as operational monitoring. All the API calls are documented in through a repository with HTML views with pdf print capabilities. Where relevant sample calls and example code is available to aid comprehension . A test suite, or 'sandbox', can be made available as needed
- API documentation
- Yes
- API documentation formats
-
- HTML
- ODF
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- The service is designed to be extensively customisable in almost every area, including workflows/business processes, forms, reports, bulletin boards, livery (for customer branding) and customer-specific data model. The ability to customise a specific instance is predominately delivered via configuration. Customers can also access and extend the functionality using the extensive API suite
Scaling
- Independence of resources
- Our customers always get a dedicated instance of our service with dedicated virtual machine, network and storage resources which can be adjusted as needed by the customer if required. Monitoring and planning services are available to assist with adapting to changing resource requirements. All transactions are queued thereby allowing the system to allow service quality to be regulated to levels. Our service allows individual transactions to be restricted to allow only transactions with known maximum resource requirements to run. Users and user groups can also be limited to resource quotas
Analytics
- Service usage metrics
- Yes
- Metrics types
- We usually define a custom set of metrics with our customers as we can extract a very broad range of data from: (i) our application; (ii) our hosting environments; and (iii) our support systems.
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Fincore Ltd
Staff security
- Staff security clearance
- Conforms to BS7858:2012
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- EU-US Privacy Shield agreement locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- An extensive API suite is provided that can facilitate full or partial export of data in the database and any files stored in their original document formats
- Data export formats
-
- CSV
- ODF
- Other
- Other data export formats
-
- PARKQET (Spark Database file images)
- JSON
- XML
- User defined using export tools
- Data import formats
-
- CSV
- ODF
- Other
- Other data import formats
-
- Parqet files (Spark data files)
- JSON
- XML
- User defined formats using our import tools
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- Depending on the hosting and support arrangements in place, we can offer SLA-governed availability levels of up to 99.9% (excluding scheduled downtime) with associated service credits
- Approach to resilience
- We offer a range of resilience options from resilient within one data centre location with regular backups to globally resilient spread across to or more data centres with additional protection from backups
- Outage reporting
- We agree outage reporting arrangements flexibly with individual customers to fit in with their own processes
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- For our standard service, the Microsoft Azure Management Portal is used to manage the Azure accounts and requires 2 factor authentication. Support access to the Azure infrastructure and servers is via 2-factor authentication across a VPN connection. This VPN is established using public key authentication. Username and password are required for access into the active directory domain. Where hosting with an alternative cloud provider or on premise is requested, access arrangements will be agreed with the customer
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- ISO27001
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
Every customer fully controls the configuration of their service-instances. Here is how we work when making changes behalf of customers: A business analyst will capture requirements to be implemented by trained specialists. A solution architect and QA team review requirements prior to design, then review and test proposed detail configuration changes prior to deployment ensuring functional, SLA, InfoSec Quality criteria are met. Change management processes for configuration changes are agreed with customers.
Our assured SaaS Software development process follows best practice standards for robust, secure trusted cloud software. Customers are key in every step of our innovation process. - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- We undertake threat reviews when we make changes to our software or infrastructure and when new threats are made public. We carry out regular penetration testing and our CSO monitors security information sources. We have a designated senior officer responsible for addressing any vulnerabilities identified. The speed of patching is proportionate to the level of threat identified
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- We have an IDS/IPS in place and anti-malware software. We collate log files centrally from all relevant system components, and these are reviewed daily by the devops team. When unusual activity is identified, it is escalated to a designated senior responsible officer who, in consultation with our CSO, will determine the appropriate course of action. Uptrends and Microsoft's Azure's Operations Management System and Security Centre are also used for monitoring
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- When incidents occur, they are triaged by a Service Manager who co-ordinates the response. Our team and customers may report incidents by phone or email, or enter them directly into our helpdesk system. Major incidents will be escalated immediately to Director level. The Service Manager provides regular updates and an incident report on resolution
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Pricing
- Price
- £5,000 an instance a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- A free trial version is available on request at our discretion for trial project with a defined scope and approved budget once evaluation has completed an a selection has been made.