Total Intelligence Ltd (G8)

MI View Cloud analytics

MI View is used for analysing (and combining) structured and/or unstructured data from single or multiple data sources (i.e. file directories, DB's). MI View can then be used to develop and deliver a variety of reports and dashboards in real time (if necessary) across the entire enterprise.


  • Real time reporting
  • Scalable, 100's millions of records, 100's users
  • Secure easy access
  • Automated data updates
  • Automated report scheduling
  • No impact on the running of operational systems
  • Optional data warehousing capability (i.e. includes ETL)
  • Fast and easy to amend reports and dashboards


  • Data displayed can be continuously updated without affecting service
  • Maximum flexibility available to end users to manipulate data


£18000 per licence per year

  • Education pricing available
  • Free trial available

Service documents


G-Cloud 11

Service ID

8 6 3 9 4 7 6 0 7 0 0 8 3 3 0


Total Intelligence Ltd (G8)

Chris Finch


Service scope

Service scope
Software add-on or extension No
Cloud deployment model
  • Public cloud
  • Private cloud
Service constraints No specific constraints, hardware configuration required will depend mainly on the volume of data, this determines more than anything the disk space required.
System requirements
  • Windows 2012 64 bit, Linux 64 bit OS
  • SUN Java JDK 64 bit 1.8

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Response times are dependent on time of the week. E mails are accepted 24 X 7 on all days. Phone contact is responded to in the week within one hour, at weekends within 2 hours. Any fixes required are distributed during normal working hours which exludes Bank holidays and weekends.
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels Support is provided initially via telephone to a support desk. Additional support may require online interaction using webex/gtm as appropriate. All this support is included as part of the the annual cost of the service/software assuming the appropriate training has been undertaken by the client. The level of engineer providing support will depend on the issue to be addressed. In the event the support desk cannot answer any particular query, the development team may get involved and if necessary develop a fix for distribution. Depending on the fix required, urgency of the situation, a fix can usually be delivered within 48 hours up to 7 working days for the less urgent.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Following any installation required (i.e. private cloud) onsite training is undertaken, typically 5 days. Additional days can be purchased as required.
User (and all) documentation is provided online
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction All data used by the application is a copy of existing operational data. This means there is no requirement to 'extract' the data at the end of the contract which means the 'copied' data can be deleted. However, if results of queries which have been run in the form of reports/dashboards need to continue to be kept these can be exported in a number of formats (e.g. PDF)
End-of-contract process At the end of contract all that is required is written (by e mail) confirmation (with 3 months notice) there is no requirement for the continuation of the service. User names and passwords are deactivated and indexes (data) relating to that User are deleted. There optionally could be a small charge to decommission the User(s) depending on any consultancy time. We would not expect this to be more than a man-day.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
Application to install Yes
Compatible operating systems
  • Linux or Unix
  • MacOS
  • Windows
Designed for use on mobile devices No
Service interface No
Customisation available Yes
Description of customisation MI View can be 'skinned' to customers requirements (i.e. logo, colours)


Independence of resources The service is configured to provide optimum usage, this depends on numbers of Users and Data volumes which dictate disk space requirements. We also ensure there is a minimum server specification to run the service.


Service usage metrics Yes
Metrics types All usage of the system is captured in an Audit file which can be reported on.
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type Reseller providing extra support
Organisation whose services are being resold Connexica Ltd

Staff security

Staff security
Staff security clearance Staff screening not performed
Government security clearance None

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Managed by a third party
Penetration testing frequency At least every 6 months
Penetration testing approach ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process Yes
Data sanitisation type Explicit overwriting of storage before reallocation
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach Results of processing can be exported outside the application in a number of ways which are CSV, Excel, HTML, Image, PDF, XML
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats
  • Excel
  • HTML
  • PDF
  • Image
  • XML
Data import formats
  • CSV
  • Other
Other data import formats
  • Oracle
  • DB2
  • Postgress SQL
  • MySQL
  • Sybase
  • SQL Server 2008 & above
  • SQL server 2000-2005
  • MI View (other instances of)

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)
  • Other
Other protection between networks Data transfer can be via SFTP
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)
  • Other
Other protection within supplier network Data transfer can be via SFTP

Availability and resilience

Availability and resilience
Guaranteed availability SLA's which we support relate purely to any 'bugs' within the software and the speed of response depnding on the nature of the issue.
Approach to resilience Available on request.
Outage reporting Any outage would trigger e mail alerts

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels In order to access management interfaces and support channels the relevant user must have been assigned the relevant permissions. Standard users will not have access to the relevant screens in order to make amendments to application configuration. Admin users authenticate onto the system by using User names and passwords like standard users. MI View offers a high degree of flexibility with the password policies that are enforced as well as giving the user the ability to audit log on and log off events. We have an access process for management/support channels to ensure only qualified staff access client instances.
Access restriction testing frequency At least once a year
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information You control when users can access audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information You control when users can access audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards Other
Other security governance standards Supplier defined
Information security policies and processes Total Intelligence is responsible for ensuring the service is installed in a secure environment. The data processed within the service is encrypted so is NOT accessible by any other process/or Users outside the application.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach All upgrades and fixed releases are managed through the defined change management process. This ensures that clients are already aware of all scheduled application changes and that there is an associated design, development, QA and release mechanism in place that shows that changed functionality has been tested and meets the requirements specified prior to release into production. In addition, it is possible to define agreed release schedules so that software changes (unless agreed as a priority fix) are only implemented within specified dates and times to minimise any potential impact on the organisation whilst the implementation is taking place.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Upgrades and fixed releases are managed through the defined change management process. This ensures that clients are already aware of all scheduled application changes and that there is an associated design, development, QA and release mechanism in place that shows that changed functionality has been tested and meets the requirements specified prior to release into production. Systems have been configured for clients to automatically provide notification of issues on the host server regarding CPU/memory utilisation as well as systems that automate backup processes. Preferred hosting partners identify potential compromises and responds to these threats in accordance with the ISO27001:2014 standard.
Protective monitoring type Supplier-defined controls
Protective monitoring approach For each major release we complete an automated vulnerability scan to highlight any known vulnerabilities within the architecture of the application. This focuses on reviewing the application against vulnerabilities highlighted by OWASP. We review the literature/information provided by OWASP to ensure that newly discovered issues are already handled within the application. The development team patch gaps within 2 weeks. Additionally we have had penetration tests completed by external security consultants approved by the CREST organisation when we have made major functional changes to the application.
Incident management type Supplier-defined controls
Incident management approach We have built up a significant repository of knowledge to help us rectify frequent or known problems quickly and efficiently. We have defined SLA's for different incident classifications dependent on severity and associated business impact. If the issue cannot be resolved immediately it will be passed to the development teams to formulate a solution to the problem which will be subsequently tested and made available as a patch release. Users report incidents through the online helpdesk portal. We also provide weekly incident reports through this portal.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks Yes
Connected networks NHS Network (N3)


Price £18000 per licence per year
Discount for educational organisations Yes
Free trial available Yes
Description of free trial We will provide a Cloud based account to allow you to appreciate some of the capabilities of MI View, providing you undertake some basic training (2 hours) in the UI first. A trial would be for a maximum of 5 working days.

Service documents

Return to top ↑