Microstrategy for UK Government is a secure Cloud based M.I.S M.I. MIS MI BI reporting solution, designed specifically for the public sector user. Via a simple per user monthly subscription fee, it provides access to the industry’s leading BI platform to deliver intelligent insight and actionable analytics to drive change.
- No upfront investment or infrastructure required
- Secure hosted environment ISO27001 certified
- Create responsive, device-agnostic solutions
- Support via ITIL and ISO20000 compliant Service Desk
- Quick and cost effective deployment
- Expert training by Microstrategy specialists
- Access to on-boarding experts to support deployment
- Dedicated testing team certified to ISO20000 service management
- Hosting via tier 1 provider with 99.9% availability per month
- Access to Microstrategy’s entire BI platform
- In-depth analysis from the world’s leading BI software
- Designed to empower non-technical users to explore data
- Designed to deliver actionable analytics to drive change
- Scalable based on user and business needs
- Easy and intuitive to use
- 1 year term license saves one third of list price
- Secure handling of sensitive or personal data is assured
- Accessed via browser, tablet and mobile
- Quickly see return on investment
£3651 per licence per month
0113 399 4076
|Software add-on or extension||No|
|Cloud deployment model||Private cloud|
|System requirements||The solution requires Microstrategy for mobile (app) or web installed|
|Email or online ticketing support||Email or online ticketing|
|Support response times||Included in the service are standard support from 9 to 5.30 Mon-Fri, extensions up to 24x7 available on request. Standard support response times vary between 15 mins and 1 day, depending upon priority. For full details of response times, please refer to the service definition document.|
|User can manage status and priority of support tickets||Yes|
|Online ticketing support accessibility||None or don’t know|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||No|
|Onsite support||Yes, at extra cost|
|Support levels||Our standard SLA provides incident response targets based on severity, e.g. P1 loss of service – restoration in 2hrs. We provide 5 support levels ranging from business critical to low priority. For more information, please refer to the attached service description. Access to the service desk is subject to establishing a Support and Maintenance Contract with us. We establish a support contract with a minimum level of provision per month, appropriate to the size and complexity of your project. CDS' Service Desk operates to ITIL standards and is manned by dedicated team of support technicians and experienced developers.|
|Support available to third parties||No|
Onboarding and offboarding
On boarding of data will involve an analysis phase. Working with the customer, we will identify the data sources the customer has or wishes to access as part of the proposed solution. Once agreed, CDS will work with the customer to extract data from the identified sources into a number of staging data sources. Based on the required metrics, CDS will create a series of dynamic dashboard reports that will allow the user to gain visual actionable insight.
To support the transition to Cloud based BI solution, CDS and Microstrategy are able to provide a range of training courses.
Introductory training is offered free of charge at Microstrategy’s premises in West London. This is based on joining a “public” training course with other customers.
CDS is also able to provide bespoke training to help support the deployment. All training is “hands-on”, delivered by one of CDS’ experienced BI experts. Training sessions can be delivered either on-site or at one of CDS’ offices in Leeds, Cheltenham or London.
Professionally written user documentation can be provided at an additional cost which will include step-by-step instructions and screenshots of your delivered system.
|End-of-contract data extraction||Ownership of the data contained in the solution belongs and rests with the client/customer. As the service is decommissioned the data will be extracted in its native format and transferred to the client via trusted hand.|
|End-of-contract process||The service will cease on the agreed date/time and users will be denied access. All data will be returned to the client in accordance with the specific client contract.|
Using the service
|Web browser interface||Yes|
|Application to install||Yes|
|Compatible operating systems||
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||Native app functionality that uses touch, swipe & pinch features are mirrored as closely as possible in the browser version.|
|Accessibility standards||None or don’t know|
|Description of accessibility||The service is accessed via a tablet application or web browser interface.|
|Description of customisation||With the necessary skills, dashboards can be created and customised using Microstrategy.|
|Independence of resources||In order to guarantee that users are not affected by the demands from other users, we use resource reservations and shares such as internet bandwidth shaping. In addition, the capacity planning team ensure that usage in terms of all resources are constantly monitored and increased accordingly relating to user demand.|
|Service usage metrics||Yes|
|Metrics types||User activity. Login date, Login count, activity, job & sessions run etc.|
|Supplier type||Not a reseller|
|Staff security clearance||Conforms to BS7858:2012|
|Government security clearance||Up to Security Clearance (SC)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||United Kingdom|
|User control over data storage and processing locations||No|
|Datacentre security standards||Complies with a recognised standard (for example CSA CCM version 3.0)|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||‘IT Health Check’ performed by a CHECK service provider|
|Protecting data at rest||Physical access control, complying with CSA CCM v3.0|
|Data sanitisation process||Yes|
|Data sanitisation type||Explicit overwriting of storage before reallocation|
|Equipment disposal approach||Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001|
Data importing and exporting
|Data export approach||The software allows for data to be extracted from the desktop solution.|
|Data export formats||
|Data import formats||
|Other data import formats||Json|
|Data protection between buyer and supplier networks||Legacy SSL and TLS (under version 1.2)|
|Data protection within supplier network||
Availability and resilience
|Guaranteed availability||99% availability during service hours (9am - 5pm Monday to Friday).|
|Approach to resilience||Available on request|
|Outage reporting||Email alert via Account Manager channels|
Identity and authentication
|User authentication needed||Yes|
|User authentication||Username or password|
|Access restrictions in management interfaces and support channels||
Customers can raise and update support tickets using our interactive online portal and/or email. Access to our portal is by invitation only, and requires a username and password. Interaction by email can be restricted to specific domains, email addresses, or disabled altogether. We also offer access by telephone for urgent requests, and will always attempt to verify the identity of the caller, either using our standard procedure, or one agreed with the customer.
Access to management interfaces are only available from the CDS network.
|Access restriction testing frequency||At least once a year|
|Management access authentication||Dedicated link (for example VPN)|
Audit information for users
|Access to user activity audit information||Users contact the support team to get audit information|
|How long user audit data is stored for||At least 12 months|
|Access to supplier activity audit information||Users contact the support team to get audit information|
|How long supplier audit data is stored for||At least 12 months|
|How long system logs are stored for||Between 1 month and 6 months|
Standards and certifications
|ISO/IEC 27001 certification||Yes|
|Who accredited the ISO/IEC 27001||BSI|
|ISO/IEC 27001 accreditation date||05/11/2004|
|What the ISO/IEC 27001 doesn’t cover||Our certification includes excludes satellite sites.|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||Yes|
|Any other security certifications||Cyber Essentials Plus|
|Named board-level person responsible for service security||Yes|
|Security governance certified||Yes|
|Security governance standards||ISO/IEC 27001|
|Information security policies and processes||
CDS is certificated to BS EN ISO 27001 – Information Security Management System and registered under the Data Protection Act 1998. (DPA No. Z5255664).
CDS ensures client information is securely maintained through our audited processes and procedures. These are detailed in our SYSOPS which form part of our ISO27001 accreditation which is independently audited twice yearly. Our SYSOPS cover personnel and IT security requirements.
All managers and staff within CDS will take steps to ensure that personal data is kept secure at all times against unauthorised or unlawful loss or disclosure.
CDS employs a dedicated Security manager (ITSM) and runs a Security forum which is chaired by our Managing Director ensuring board level engagement.
|Configuration and change management standard||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Configuration and change management approach||
CDS operate a mature Change Management process, which is certified to the ISO 20000 standard. We ensure that all configuration or service changes are put through a controlled Change Management process, to ensure that impact and risk are managed, quality is maintained, and that changes are planned, documented and approved. Impact and risk assessment includes security considerations.
Our Change Register is underpinned by a Configuration Management toolset and process, which charts the lifecycle of configuration items, and allows for them to be linked to service transactions, such as incidents and changes.
|Vulnerability management type||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Vulnerability management approach||
CDS undertake periodic independent pen and vulnerability scanning of our networks and network services. This forms part of our ISO 27001 and Cyber Essentials Plus accreditation.
CDS also undertake vulnerability scanning of client solutions during development and at the point of release.
Nessus scans of the whole environment are performed weekly.
Any identified vulnerabilities are assessed based upon the threat type and business risk. Those issues requiring attention form part of a remediation plan. The individual items are logged and assigned a priority based upon severity and tracked through our ITIL service desk.
|Protective monitoring type||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Protective monitoring approach||
IDS and IPS are in place on firewalls which provide perimeter protection to our networks and are configured to alert on suspicious activity e.g. sql injection, XSS etc.
Logs are also monitored using ManageEngine. Server Logs and Syslogs are harvested to a central reporting server and alerts are in place to notify suspicious activity such as repeated, failed administrator login attempts as well as more sophisticated events indicating exfiltration attempts. Where relevant and appropriate, GPG13 logging is implemented – by way of example we implemented this level of reporting and alerting for the Metropolitan Police.
|Incident management type||Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402|
|Incident management approach||CDS operate a mature Incident and Service Request Management process, certified to the ISO 20000 standard. The process is operated by our Service Management tool, which is interactive and can be configured to support the ticket workflow and metrics agreed with customers. Customers can report and update incidents via our interactive portal, email and telephone. Though we operate a core Incident Management policy and process, these can be tailored within customers Service Level Agreements to support common incidents and events. We operate a separate Major Incident Management process, which can provide incident reports, post-mortems etc., when criteria are triggered.|
|Approach to secure software development best practice||Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)|
Public sector networks
|Connection to public sector networks||No|
|Price||£3651 per licence per month|
|Discount for educational organisations||No|
|Free trial available||No|
|Pricing document||View uploaded document|
|Skills Framework for the Information Age rate card||View uploaded document|
|Service definition document||View uploaded document|
|Terms and conditions document||View uploaded document|