ST. VINCENT'S HEALTH AND PUBLIC SECTOR CONSULTING LIMITED

Business Intelligence and Analytics

We implement business intelligence and analytics solutions that enable organisations to measure, analyse and improve systems, processes, workflows and utilisation.

Features

  • Data analysis
  • Integration with other software systems
  • Interactive reporting and analysis
  • Single Sign-On
  • Three-tier technology architecture

Benefits

  • Interactive
  • Works alongside existing software
  • User friendly
  • In depth data analysis
  • Configured to follow the latest guidelines and regulations
  • Incorporates comprehensive terminology
  • Real time
  • Improves safety
  • Reduces delay
  • Measurable

Pricing

£140 per person

  • Education pricing available
  • Free trial available

Service documents

G-Cloud 9

802786186336104

ST. VINCENT'S HEALTH AND PUBLIC SECTOR CONSULTING LIMITED

Seonaid McGinn

0141 899 0056

seonaid.mcginn@stvincentsconsulting.com

Service scope

Service scope
Software add-on or extension Yes, but can also be used as a standalone service
What software services is the service an extension to Further information on request.
Cloud deployment model Hybrid cloud
Service constraints N/a
System requirements No specific system requirements

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Mon - Friday 9am - 5pm
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), 7 days a week
Web chat support No
Onsite support Onsite support
Support levels Support based on, and flexible to, client's needs.

Cost dependent on requirements.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started We provide onsite training, online training and user documentation.
Service documentation Yes
Documentation formats
  • HTML
  • ODF
  • PDF
End-of-contract data extraction Flexible to client's requirements. More information on request.
End-of-contract process Flexible to client's requirements. More information on request.

Using the service

Using the service
Web browser interface No
Application to install Yes
Compatible operating systems
  • Android
  • IOS
  • Linux or Unix
  • MacOS
  • Windows
  • Windows Phone
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Mobile data intelligence and analysis tools
Accessibility standards WCAG 2.0 AAA
Accessibility testing Compatible with a range of mobile technology, including assistive technology.
API Yes
What users can and can't do using the API More information on request
API documentation Yes
API documentation formats
  • HTML
  • ODF
  • PDF
API sandbox or test environment Yes
Customisation available Yes
Description of customisation Can be tailored to client's requirements. More information on request.

Scaling

Scaling
Independence of resources We have a large flexible pool of resource that grows in line with demand.

Analytics

Analytics
Service usage metrics Yes
Metrics types We can provide various metrics dependent on business need.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Supplier-defined controls
Penetration testing frequency At least once a year
Penetration testing approach In-house
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach Flexible to client's requirements. More information on request.
Data export formats
  • CSV
  • ODF
Data import formats
  • CSV
  • ODF

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Bonded fibre optic connections
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Availability and resilience
Guaranteed availability More information available on request.
Approach to resilience More information available on request.
Outage reporting More information available on request.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels Access can be restricted as per client's requirements. More information on request.
Access restriction testing frequency At least once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
  • Other

Audit information for users

Audit information for users
Access to user activity audit information Users receive audit information on a regular basis
How long user audit data is stored for User-defined
Access to supplier activity audit information Users receive audit information on a regular basis
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 Available on request
ISO/IEC 27001 accreditation date Available on request
What the ISO/IEC 27001 doesn’t cover Available on request
ISO 28000:2007 certification Yes
Who accredited the ISO 28000:2007 Available on request
ISO 28000:2007 accreditation date Available on request
What the ISO 28000:2007 doesn’t cover Available on request
CSA STAR certification Yes
CSA STAR accreditation date Available on request
CSA STAR certification level Level 5: CSA STAR Continuous Monitoring
What the CSA STAR doesn’t cover Available on request
PCI certification Yes
Who accredited the PCI DSS certification Available on request
PCI DSS accreditation date Available on request
What the PCI DSS doesn’t cover Available on request
Other security accreditations Yes
Any other security accreditations Available on request

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance accreditation Yes
Security governance standards
  • CSA CCM version 3.0
  • ISO/IEC 27001
Information security policies and processes More information available on request.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach We regularly evaluate each system, resource and component of the project and provide post-implementation support, training and guidance. Our systems keep up to date with regulatory changes and all updates are thoroughly assessed for their potential impact on security.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Services and solutions are regularly monitored for threats. We assess, analyse, manage and update all vulnerability management processes regularly.

Further information is available on request.
Protective monitoring type Supplier-defined controls
Protective monitoring approach Potential compromises are monitored. Instant mitigative action is taken if we believe a compromise has been identified. Our full protective monitoring process is available on request.
Incident management type Supplier-defined controls
Incident management approach We have pre-defined processes for common events. Users can report incidents by email or telephone. Processes available on request.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks Yes
Connected networks
  • Public Services Network (PSN)
  • Police National Network (PNN)
  • New NHS Network (N3)
  • Joint Academic Network (JANET)
  • Scottish Wide Area Network (SWAN)
  • Other

Pricing

Pricing
Price £140 per person
Discount for educational organisations Yes
Free trial available Yes
Description of free trial More information available on request.

Documents

Documents
Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Terms and conditions document View uploaded document
Return to top ↑