Centerprise International Ltd

Centerprise Business Analytics Service

Centerprise Business Analytics Service is built on the Qlik data visualisation and discovery tool. With its associative analytics engine, sophisticated AI, and high performance cloud platform, you can empower everyone in your organisation to make better decisions daily, creating a truly data-driven enterprise.

Features

  • Smart connection software which assembles and organises your data
  • Select and filter data fields using different variables
  • Multi level user access to relevant data
  • Create report templates to be automatically generated
  • Automatically deliver reports to relevant personnel
  • Experience with Rest API and other 3rd party integrations
  • Self-Service Discovery and Visualization
  • Conversational Analytics and Natural Language Processing
  • Interactive Dashboards
  • Sophisticated, intelligent alerting

Benefits

  • Easy for developers to assemble their data in usable format.
  • User can view the key data using smart, intuitive visualisations
  • Admin-users have the ability to control dashboards access of users.
  • Restricted access to selected personnel only.
  • Automated reports are sent with current date
  • Automated delivery ensures a regular, professional process is maintained
  • Put world-class, modern analytics in everyone's hands
  • Create a data literate workforce with AI and conversational interaction.
  • Experience unmatched performance on your cloud of choice

Pricing

£12.50 to £14.50 a user a month

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tendersteam@centerprise.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 12

Service ID

7 9 2 1 6 0 0 2 8 9 8 0 8 9 2

Contact

Centerprise International Ltd Tenders Team
Telephone: 01256 378 000
Email: tendersteam@centerprise.co.uk

Service scope

Software add-on or extension
No
Cloud deployment model
Private cloud
Service constraints
No
System requirements
None

User support

Email or online ticketing support
Email or online ticketing
Support response times
15 minute response,
1 - 8 hour fix depending on priority (P1-3) Monday-Friday 8:00 to 18:00 UK time.
Excludes weekends and Bank Holidays
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Overview.
There are 3 Service Desk packages: Silver, Gold and Platinum.
Silver Service Hours are 09:00 to 17:30 Monday to Friday (excluding UK Bank Holidays);
Gold Service Hours are 08:00 to 20:00 Monday to Friday (excluding UK Bank Holidays);
and Platinum Service Hours are 24x7x365. 2.

Incident Target Resolution.

Priority 1 - High. Service is completely unavailable or there is a critical impact on the Customer’s business operation: 4 hours.
Priority 2 - Medium. The Service is severely degraded or there is a significant impact on the Customer’s business operation: 8 hours.
Priority 3 - Low. The quality of the Service is degraded and is affecting one or more users: 16 hours.
Priority 4 - Service Request. Customer is seeking a change to the Service: 5 working days.

Service Credits.

A Service Credit regime is used to recompense the Customer for failures to meet the agreed Service Level. Service Credits are valued as a percentage of the related Service Charges for the month.
Support available to third parties
No

Onboarding and offboarding

Getting started
Support for initial setup and configuration, gathering requirements and objectives, and modifying system parameters to suit your needs.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Centerprise can provide consultancy and support to assist you in extracting data at the end of the contract
End-of-contract process
Users can export data downloads via a web interface to meet information requests requirements.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
None
Service interface
No
API
No
Customisation available
Yes
Description of customisation
The backend and frontend of the application has white labelling capability.

Scaling

Independence of resources
We use cloud technologies that are designed to insure appropriate resource are at all times allocated to the most intensive processes.

Analytics

Service usage metrics
Yes
Metrics types
Usage summary, including raw volume, active users, disk used.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Dashboards can be exported as a pdf (Navigation menu). Stories can be exported as pdf or ppt (Navigation Menu). Dashboard objects can be exported as xls (Right click).
Data export formats
Other
Other data export formats
  • PDF
  • PPT
  • XLS
Data import formats
Other
Other data import formats
Not applicable

Data-in-transit protection

Data protection between buyer and supplier networks
Private network or public sector network
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
Centerprise guarantee 99.99% availability, defined a the ability to resolve DNS requests on port 53 of the designated IP address. If in any calendar month, Service Availability is below the stated Service Level percentage in this document, upon approval of a claim, we will provide the applicable remedy based on sliding scale, in the form of a credit of a defined percentage of the monthly fee.
Approach to resilience
The system is designed to offer 99.999% availability to customers. It does this by having a highly available dispersed architecture which self-heals when an outage is detected. The system has built in redundancy so that it can continue to operate even if one or more of the services is temporarily unavailable
Outage reporting
The system will notify the support team of alerts via email alerts, and a dashboard available to the support team. If the customer wishes to receive these notifications as well they can on request.

Identity and authentication

User authentication needed
Yes
User authentication
Username or password
Access restrictions in management interfaces and support channels
Users in management positions are granted more administration rights. These chosen 'admin-users' have the ability to control dashboards access of 'regular users'. This restricts access to selected personnel only.
Access restriction testing frequency
At least every 6 months
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
No audit information available
Access to supplier activity audit information
No audit information available
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
ISOQAR
ISO/IEC 27001 accreditation date
12/02/2018
What the ISO/IEC 27001 doesn’t cover
N/A - Everything is covered by our ISO 27001 certification
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
Yes
Who accredited the PCI DSS certification
SecurityMetrics
PCI DSS accreditation date
10th November 2018
What the PCI DSS doesn’t cover
N/a
Other security certifications
Yes
Any other security certifications
Cyber Essentials plus

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
In-line with the requirements of ISO 27001 and 20000, we've developed policies and procedures to support both standards and comply with the requirements of ISO 9001. E.g, our Information Security Policy includes the following internal policies/procedures: •IT Security Business Continuity Policy •Information Security Policy – Suppliers •CCTV Policy •CI Forensic Policy •Corporate Hospitality and Bribery Act •Access Control Policy •Policy Against Malicious Code •Child Protection Policy •Policy on the Secure Handling, Use, Storage, Retention and Destruction of Disclosure Information •Clear Desk Policy •Cryptographic Policy. The Information Security Policy has been produced and accepted by the Board. The policy is visible to all staff on SharePoint and all staff sign Appendix E of the policy, which is retained in the employee’s HR file. The importance of Information Security and the policy is covered in employee inductions and the Staff handbook. Security responsibilities are defined within our Information Security policy, which records the following managers: •Service Delivery Manager (Information Security Manager) •Security Controller •Group Quality Manager •Users – to comply with the IT Security Policy. Security Responsibilities are defined in the individual’s job description and employment contract.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
All Change Management procedures are audited as part of our Information Security accreditations and all change logs are kept and audited as part of this process. We have clearly defined procedures for both customer and supplier initiated changes and all change requests are available for real-time review via our service management system.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Multiple tools are used to block and monitor potential threats to the environment. If patches are required they are rolled out via automation tools to the environment through change control process where the criticality and impact is assessed and approved.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Potential compromises will be detected by the SIEM. An alert will be created should the SIEM directives be triggered by various correlated events. Upon receipt of alert, the SOC team will investigate the incident. Depending on the criticality, a level 1 (highest) is investigated within 15 minutes.
Incident management type
Supplier-defined controls
Incident management approach
We follow ITIL V3 for our incident management. Incidents can be reported via phone, web or email into our ticketing system. Incident reports are provided through the ticketing system with details provided around root cause analysis and remediation steps.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Pricing

Price
£12.50 to £14.50 a user a month
Discount for educational organisations
Yes
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tendersteam@centerprise.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.