19: Databrydge Cloud Integration and Interface Software
Databrydge can help you transform data between systems. They extract data and transform it using their own software, which fits in with other software. They have a special graphic interface to create mappings. In addition to transforming data, Databrydge can also collect and visualize data from multiple sources.
- Any connections possible. If not available, we can build.
- User-friendly interface.
- All-in-one. Data-integrated through automatic datavalidation.
- No cure, no-pay. No charge if solution not possible.
- Consolidate multiple-data sources into one.
- AWS hosted (private cloud).
- Possible API-integration, flatfiles via SFTP, email-systems etc
- Bespoke logging-engine; notifies users of errors automatically.
- Special-billing module. Enables price-per-use scenarios.
- Whitelabel options available (software in your own theme).
- Save time by connecting smart solutions.
- Work efficiently, with less chance of incorrect data.
- Usage of your current software.
- Increase your flexability.
- Custom-built connections so you can use best-of-breed solutions.
- We identify your requirements in a no-obligation consultation session.
- Scalable solution in the cloud.
- Experience with Dynamics, Unit4, SAP, Netsuite.
- Over 500 integrations built and in production.
- Special machine learning algorithms applied to some data-sets.
£125 per unit per hour
- Pricing document
- Skills Framework for the Information Age rate card
- Service definition document
- Terms and conditions
- Modern Slavery statement
Moore Stephens Insight Limited
020 7952 4691
|Software add-on or extension||Yes, but can also be used as a standalone service|
|What software services is the service an extension to||We are able to build connections between all kinds of software services (API's, flat file based, etcetera).|
|Cloud deployment model||Hybrid cloud|
|Service constraints||Every connection has its individual requirements. After consulting we will make you an offer of the required connection. After we will plan a scoping session with a senior developer to investigate the wishes, requirements and possibilities.|
|System requirements||It does not have any effect on our possibilities.|
|Email or online ticketing support||Email or online ticketing|
|Support response times||Depends on the agreed SLA contracts.|
|User can manage status and priority of support tickets||Yes|
|Online ticketing support accessibility||None or don’t know|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||No|
|Onsite support||Yes, at extra cost|
|Support levels||During the initial phase you will have contact with a sales person and/or Senior Developer. During building the connections you will have contact with a Developer (mainly for testing). After finalisation of the connection, we offer 3 types of SLA options. These vary in response times|
|Support available to third parties||Yes|
Onboarding and offboarding
|Getting started||During a video-call we will instruct our client on how to use/change settings of the customized connection.|
|Other documentation formats||Freshdesk Systems|
|End-of-contract data extraction||We will just eliminate the connection by changing the settings to 'pause' in our Databrydge platform.|
|End-of-contract process||We will just eliminate the connection by change settings to 'pause' in our Databrydge platform.|
Using the service
|Web browser interface||Yes|
|Application to install||No|
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||Responsive interface available.|
|Accessibility standards||None or don’t know|
|Description of accessibility||The services is accessible via a web interface.|
|What users can and can't do using the API||The API can be used to setup connections, users and organisations. Also the packages can be authenticated. This allows for a full integration with our white label platform.|
|API documentation formats||Open API (also known as Swagger)|
|API sandbox or test environment||Yes|
|Description of customisation||We can build a 'white-label' platform.|
|Independence of resources||Databrydge is hosted in a auto scaling AWS environment. White label clients have their own VPC and own tech-stack. Fully independent of other clients.|
|Service usage metrics||Yes|
|Metrics types||Databrydge logs all the outgoing API calls and usage per connection. We provide the service metrics in a downloadable export (CSV).|
|Supplier type||Not a reseller|
|Staff security clearance||Conforms to BS7858:2012|
|Government security clearance||Up to Developed Vetting (DV)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||EU-US Privacy Shield agreement locations|
|User control over data storage and processing locations||No|
|Datacentre security standards||Supplier-defined controls|
|Penetration testing frequency||Never|
|Protecting data at rest||Other|
|Other data at rest protection approach||Databrydge is hosted on the AWS platform. All security checks and groups have been applied and independently confirmed and tested. Data is stored with built in AWS encryption on all layers. Databrydge is scanned daily by Guardian360 and penetration tested every 6 months.|
|Data sanitisation process||Yes|
|Data sanitisation type||Deleted data can’t be directly accessed|
|Equipment disposal approach||A third-party destruction service|
Data importing and exporting
|Data export approach||Transactional data as part of a migration or interface is exported according to logical rule-sets configured in the system. It can be exported in a wide-range of formats as required by the target system. Configuration data can be exported in .csv format for future reference.|
|Data export formats||
|Other data export formats||
|Data import formats||
|Other data import formats||
|Data protection between buyer and supplier networks||
|Other protection between networks||In the initial scope, the security wishes will be discussed.|
|Data protection within supplier network||
|Other protection within supplier network||As above.|
Availability and resilience
|Guaranteed availability||The SLA is determined by the wishes of the client.|
|Approach to resilience||AWS allows our software to auto scale and failover to multiple availability zones.|
|Outage reporting||We report outages to named individuals via email.|
Identity and authentication
|User authentication needed||Yes|
|User authentication||Username or password|
|Access restrictions in management interfaces and support channels||Based on the role of the user (reseller or end user) the authentication principles can change i.e. for resellers a 2FA is required.|
|Access restriction testing frequency||At least every 6 months|
|Management access authentication||Username or password|
Audit information for users
|Access to user activity audit information||Users contact the support team to get audit information|
|How long user audit data is stored for||User-defined|
|Access to supplier activity audit information||Users contact the support team to get audit information|
|How long supplier audit data is stored for||User-defined|
|How long system logs are stored for||User-defined|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||Yes|
|Any other security certifications||
|Named board-level person responsible for service security||Yes|
|Security governance certified||No|
|Security governance approach||Awaiting answer.|
|Information security policies and processes||Databrydge has security and information security policies in place and an external DPO (Data Protection Officer).|
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||Databrydge works with a protected master branch. Only accepted pull requests by multiple developers will be merged into the source base.|
|Vulnerability management type||Supplier-defined controls|
|Vulnerability management approach||AWS automatically updates our machines.|
|Protective monitoring type||Supplier-defined controls|
|Protective monitoring approach||We use Cloudwatch and GuardDuty from AWS to protect from threats.|
|Incident management type||Supplier-defined controls|
|Incident management approach||We have a disaster recovery program to monitor incidents and track them. This will be communicated to the customer beforehand.|
|Approach to secure software development best practice||Supplier-defined process|
Public sector networks
|Connection to public sector networks||No|
|Price||£125 per unit per hour|
|Discount for educational organisations||No|
|Free trial available||No|