Datactics Data Quality & Data Matching Solution

Datactics is a data quality and matching solution which allows organizations to profile, cleanse and match data from disparate sources. It offers scalable Cloud-based tools to facilitate data standardization such as Single Customer View, Single Citizen View, Golden Nominal and empowers data owners to fix and improve their data.


  • Data profiling, data cleansing, data matching and data de-duplication.
  • Fast 'in-memory' solution scalable for Big Data, highly performant.
  • Data analyst friendly, drag-and-drop functionality with no programming knowledge required.
  • Data analytics for on-going and continuous monitoring of data quality.
  • Handles structured/unstructured data types ingested from any third party system.
  • Dashboards for monitoring compliance including regulations e.g. MoPI.
  • Extensive out-of-the-box DQ rules for typical citizen information providing SVOC
  • Master Data Management Integration through RestAPI, SOAP, HP7 FHYR, MSMQ.
  • Relevant use cases include financial services, justice and policing sectors.
  • Enrichment with globally curated data sets e.g. Experian, Gazetteer, AddressBase


  • Reduce manual effort by automating processes saving time and cost
  • Rapid deployment (hours, not days/weeks) brings immediate insight
  • Data matching automation, automated record categorisation and data workflow automation
  • Return broken/exception data to owner for correction/ reconciliation/ remediation
  • Improve citizen/user experience through a better understanding of their data
  • Competitively priced with strong and rapid return on investment
  • Experience with 40+ councils, police constabularies and central government departments
  • Integration with a clients LDAP systems or Active Directory
  • Improved quality/rapid matching speeds on large citizen data sets
  • Proven DQ framework incorporating pre-built accelerator logic rules


£15,000 to £150,000 an instance a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 12

Service ID

8 9 6 4 8 3 2 4 1 9 2 5 1 2 5


Telephone: 07828953368

Service scope

Software add-on or extension
Cloud deployment model
Hybrid cloud
Service constraints
Software needs to be installed an configured in client environment.
System requirements
  • Buyers must have their own hardware/VM/Cloud environment
  • Microsoft Windows, Windows Server or Linux OS.

User support

Email or online ticketing support
Email or online ticketing
Support response times
2 hours critical, one working day for other enquiries/issues.

Response provided during standard working hours.
User can manage status and priority of support tickets
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Onsite support
Yes, at extra cost
Support levels
Datactics includes a standard support package for its products and services, including a Helpdesk during UK Business Hours. On receipt of key information concerning the issue, we will categorise it on a severity scale as follows, and aim to resolve within the timeframes as outlined below: Critical - The Software is inoperable or a core function of the Software is unavailable - Response 2hr - Resolution 4hrs. Serious - A core function of the Software is significantly impaired - Response 4hrs - Resolution 8hrs. Moderate - A core function of the Software is impaired, where the impairment does not constitute a serious issue; or a non-core function of the Software is significantly impaired - Response 1 Day - Resolution 4 days. Minor - Any impairment of the Software not falling into the above categories; and any cosmetic issue affecting the Software - Response 5days - Resolution 10 Days.
Support available to third parties

Onboarding and offboarding

Getting started
The level of engagement depends on client requirements; some require fully-managed implementations whereas others prefer to be completely self-sufficient and Datactics can provide for all scenarios. The most common engagement involves initial implementation of software and rules building before training and handing over to the client. Datactics can provide onsite training as well as online training modules (via a partner). Comprehensive user and system-specific documentation is provided
Service documentation
Documentation formats
  • HTML
  • PDF
  • Other
Other documentation formats
Help files contained within the software.
End-of-contract data extraction
Datactics does not store copies of client's data but instead processes the data in-memory and deletes it automatically once processed. Data is exported in the form of transformed / cleansed data files and exception reports. A series of log files are created that detail process runs and metadata on users. All of the data mentioned above can be easily extracted at the end of a contract by a user with administrator login credentials. Datactics can assist with this process to ensure complete deletion, if required.
End-of-contract process
If the client wishes to terminate the contract or not renew, they should give 90x days notice. Should the client wish to renew / extend the service contract, they must give 30x days notice. Datactics can work with the client to ensure all data is extracted / deleted from the system as required. The software can then be uninstalled from the machine. Any work that involves migration to a new system will be charged as per SFIA rate card.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
Application to install
Compatible operating systems
  • Linux or Unix
  • Windows
Designed for use on mobile devices
Service interface
What users can and can't do using the API
The Data Quality Manager can be accessed via a RESTful API. Users can perform all tasks via REST that can be performed through the user interface, with the exception of any Master Record Manager related functionality. All entity (role, user, solution, etc) definitions are specified using XML. Solutions can be executed via REST, either synchronously or asynchronously.
API documentation
API documentation formats
API sandbox or test environment
Customisation available
Description of customisation
Datactics provides a basic out of the box solution which is then configured during a period of implementation. Initial configuration is typically carried out by experienced Datactics Data Engineers and then handed over to client once tested and in production. The Datactics service is very customisable - clients can configure and build new rules and workflows to meet their own specific requirements.


Independence of resources
Server CPU, Memory and network activities are continually monitored. System administrators will be alerted if a threshold is breached allowing the appropriate action to be taken.


Service usage metrics
Metrics types
Datactics provides detailed usage metrics of the service that include; who used the service, when it was accessed, when the service was run, success indicators of runs, failure indicators, detailed artefacts, detailed analysis of time taken for each run to an individual node level. The service usage metrics are provided via an interactive dashboard accessed via the proprietary Data Quality Manager application. This information can be exported for audit purposes. The system uses role-based access to restrict access to this functionality to authorised personnel only.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Other
Other data at rest protection approach
At rest data encrypted on SAN.
Data sanitisation process
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Data can be exported in a number of ways including, but Not limited to; CSV export, XLS export, email, JSON, API, JDBC, ODBC, uploaded to FTPS / SFTP.
Data export formats
  • CSV
  • Other
Other data export formats
  • .XLS
  • JSON
  • JDBC
  • ODBC
Data import formats
  • CSV
  • Other
Other data import formats
  • Txt
  • Xml
  • Json
  • Xlsx
  • Jdbc
  • Odbc

Data-in-transit protection

Data protection between buyer and supplier networks
Other protection between networks
Datactics does not store copies of client's data or transfer data between networks outside of the buyer's own secure environment.
Data protection within supplier network
Other protection within supplier network
Datactics does not store or transfer any of the buyer's data within our own network.

Availability and resilience

Guaranteed availability
The Datactics service is tailored to the customer’s requirements. Appropriate service levels can be agreed prior to an order being placed. The service levels will be documented and written into a formal agreement.
Approach to resilience
The Datactics service is deployed within the buyer's datacentre.
Outage reporting
Datactics proprietary Data Quality Manager software records a full audit trail of when the service was run and by which member of staff. If the service has any outages, the details are recorded in log files and administrators can drill down to quickly identify reasons for service failure.

Identity and authentication

User authentication needed
User authentication
Username or password
Access restrictions in management interfaces and support channels
Access is restricted by login credentials with defined roles and responsibilities.
Access restriction testing frequency
At least every 6 months
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users receive audit information on a regular basis
How long user audit data is stored for
Access to supplier activity audit information
Users receive audit information on a regular basis
How long supplier audit data is stored for
How long system logs are stored for

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance approach
The Security officer has a documented framework for security governance, with policies that cover services we provide to clients. There is a mechanism for reporting any potential security risks. Security and information security processes are reviewed regularly to ensure they comply with legal requirements. NB - Datactics does not transfer or store the buyer's information outside of the buyer's network.
Information security policies and processes
Datactics’ information security policies and procedures ensure; (1) business continuity through the prevention, control, and minimisation of the impact of information security incidents; (2) the confidentiality, integrity, and availability of customer information by documenting, implementing, and measuring information security controls against defined policies; (3) that company employees comply with legal, regulatory, and contractual requirements relating to the security of customer information. All information security incidents are reported, classified, handled, reviewed and documented using security incident management processes. Information Security Officer has a documented framework for security governance, with policies that cover services we provide to clients. There is a mechanism for reporting any potential security risks. Security and information security processes are reviewed regularly to ensure they comply with legal requirements. All Datactics authorised users undergo appropriate screening prior to engagement. All Datactics authorised users understand their security roles and responsibilities, and this is included in appropriate recruitment documentation and contracts. Any change of role is subject to system access, permission and asset possession review.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Software changes and patches are centrally distributed and the configuration must be centrally controlled. The Software Version Control Officer(s) is responsible for designating and configuring changes to software that is in use and shall have access to systems used to distribute software. Other personnel shall not have privileges to distribute software. Changes made to software distribution points shall be tested, monitored and logged. All software changes must be done using the normal change process.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
NB - Datactics service is typically deployed inside a buyer's network and adheres to their vulnerability management processes. When required, Datactics follows a standard vulnerability management process: preparation, vulnerability scanning, define remediating actions, implement remediating actions, rescan. The scanning is performed using a third party vendor tool.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
NB - Datactics service is typically deployed inside a buyer's network and adheres to their designated protective monitoring processes.
Incident management type
Supplier-defined controls
Incident management approach
Datactics follows standard incident management processes:
Incident identification; Incident logging; Incident categorization
Incident prioritization; Initial diagnosis; Escalation, as necessary, to level 2 support; Incident resolution; Incident closure; Communication with user group throughout the life of the incident. Users typically report incidents via the service support desk function. Certain incidents may also be reported by certain users directly via their Line Manager and then logged and recorded via support desk function. After a full investigation has been conducted, incident reports are made available to buyers. It is recommended that regular reviews take place with buyers to discuss levels of recorded incidents.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks


£15,000 to £150,000 an instance a year
Discount for educational organisations
Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.