CDS

MicroStrategy BI for UK Government

Microstrategy for UK Government is a secure Cloud based M.I.S M.I. MIS MI BI reporting solution, designed specifically for the public sector user. Via a simple per user monthly subscription fee, it provides access to the industry’s leading BI platform to deliver intelligent insight and actionable analytics to drive change.

Features

  • No upfront investment or infrastructure required
  • Secure hosted environment ISO27001 certified
  • Create responsive, device-agnostic solutions
  • Support via ITIL and ISO20000 compliant Service Desk
  • Quick and cost effective deployment
  • Expert training by Microstrategy specialists
  • Access to on-boarding experts to support deployment
  • Dedicated testing team certified to ISO20000 service management
  • Hosting via tier 1 provider with 99.9% availability per month

Benefits

  • Access to Microstrategy’s entire BI platform
  • In-depth analysis from the world’s leading BI software
  • Designed to empower non-technical users to explore data
  • Designed to deliver actionable analytics to drive change
  • Scalable based on user and business needs
  • Easy and intuitive to use
  • 1 year term license saves one third of list price
  • Secure handling of sensitive or personal data is assured
  • Accessed via browser, tablet and mobile
  • Quickly see return on investment

Pricing

£3651 per licence per month

Service documents

G-Cloud 10

923516379502234

CDS

James Davis

0113 399 4076

james.davis@cds.co.uk

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Private cloud
Service constraints N/A
System requirements The solution requires Microstrategy for mobile (app) or web installed

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Included in the service are standard support from 9 to 5.30 Mon-Fri, extensions up to 24x7 available on request. Standard support response times vary between 15 mins and 1 day, depending upon priority. For full details of response times, please refer to the service definition document.
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels Our standard SLA provides incident response targets based on severity, e.g. P1 loss of service – restoration in 2hrs. We provide 5 support levels ranging from business critical to low priority. For more information, please refer to the attached service description. Access to the service desk is subject to establishing a Support and Maintenance Contract with us. We establish a support contract with a minimum level of provision per month, appropriate to the size and complexity of your project. CDS' Service Desk operates to ITIL standards and is manned by dedicated team of support technicians and experienced developers.
Support available to third parties No

Onboarding and offboarding

Onboarding and offboarding
Getting started On boarding of data will involve an analysis phase. Working with the customer, we will identify the data sources the customer has or wishes to access as part of the proposed solution. Once agreed, CDS will work with the customer to extract data from the identified sources into a number of staging data sources. Based on the required metrics, CDS will create a series of dynamic dashboard reports that will allow the user to gain visual actionable insight.
Training
To support the transition to Cloud based BI solution, CDS and Microstrategy are able to provide a range of training courses.
Introductory training is offered free of charge at Microstrategy’s premises in West London. This is based on joining a “public” training course with other customers.
CDS is also able to provide bespoke training to help support the deployment. All training is “hands-on”, delivered by one of CDS’ experienced BI experts. Training sessions can be delivered either on-site or at one of CDS’ offices in Leeds, Cheltenham or London.
Professionally written user documentation can be provided at an additional cost which will include step-by-step instructions and screenshots of your delivered system.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction Ownership of the data contained in the solution belongs and rests with the client/customer. As the service is decommissioned the data will be extracted in its native format and transferred to the client via trusted hand.
End-of-contract process The service will cease on the agreed date/time and users will be denied access. All data will be returned to the client in accordance with the specific client contract.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install Yes
Compatible operating systems
  • Android
  • IOS
  • MacOS
  • Windows
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Native app functionality that uses touch, swipe & pinch features are mirrored as closely as possible in the browser version.
Accessibility standards None or don’t know
Description of accessibility The service is accessed via a tablet application or web browser interface.
Accessibility testing None
API No
Customisation available Yes
Description of customisation With the necessary skills, dashboards can be created and customised using Microstrategy.

Scaling

Scaling
Independence of resources In order to guarantee that users are not affected by the demands from other users, we use resource reservations and shares such as internet bandwidth shaping. In addition, the capacity planning team ensure that usage in terms of all resources are constantly monitored and increased accordingly relating to user demand.

Analytics

Analytics
Service usage metrics Yes
Metrics types User activity. Login date, Login count, activity, job & sessions run etc.
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations No
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach ‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest Physical access control, complying with CSA CCM v3.0
Data sanitisation process Yes
Data sanitisation type Explicit overwriting of storage before reallocation
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach The software allows for data to be extracted from the desktop solution.
Data export formats
  • CSV
  • ODF
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats Json

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Availability and resilience
Guaranteed availability 99% availability during service hours (9am - 5pm Monday to Friday).
Approach to resilience Available on request
Outage reporting Email alert via Account Manager channels

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Username or password
Access restrictions in management interfaces and support channels Customers can raise and update support tickets using our interactive online portal and/or email. Access to our portal is by invitation only, and requires a username and password. Interaction by email can be restricted to specific domains, email addresses, or disabled altogether. We also offer access by telephone for urgent requests, and will always attempt to verify the identity of the caller, either using our standard procedure, or one agreed with the customer.
Access to management interfaces are only available from the CDS network.
Access restriction testing frequency At least once a year
Management access authentication Dedicated link (for example VPN)

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for Between 1 month and 6 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 BSI
ISO/IEC 27001 accreditation date 05/11/2004
What the ISO/IEC 27001 doesn’t cover Our certification includes excludes satellite sites.
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications Cyber Essentials Plus

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes CDS is certificated to BS EN ISO 27001 – Information Security Management System and registered under the Data Protection Act 1998. (DPA No. Z5255664).
CDS ensures client information is securely maintained through our audited processes and procedures. These are detailed in our SYSOPS which form part of our ISO27001 accreditation which is independently audited twice yearly. Our SYSOPS cover personnel and IT security requirements.
All managers and staff within CDS will take steps to ensure that personal data is kept secure at all times against unauthorised or unlawful loss or disclosure.
CDS employs a dedicated Security manager (ITSM) and runs a Security forum which is chaired by our Managing Director ensuring board level engagement.

Operational security

Operational security
Configuration and change management standard Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach CDS operate a mature Change Management process, which is certified to the ISO 20000 standard. We ensure that all configuration or service changes are put through a controlled Change Management process, to ensure that impact and risk are managed, quality is maintained, and that changes are planned, documented and approved. Impact and risk assessment includes security considerations.
Our Change Register is underpinned by a Configuration Management toolset and process, which charts the lifecycle of configuration items, and allows for them to be linked to service transactions, such as incidents and changes.
Vulnerability management type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach CDS undertake periodic independent pen and vulnerability scanning of our networks and network services. This forms part of our ISO 27001 and Cyber Essentials Plus accreditation.
CDS also undertake vulnerability scanning of client solutions during development and at the point of release.
Nessus scans of the whole environment are performed weekly.
Any identified vulnerabilities are assessed based upon the threat type and business risk. Those issues requiring attention form part of a remediation plan. The individual items are logged and assigned a priority based upon severity and tracked through our ITIL service desk.
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach IDS and IPS are in place on firewalls which provide perimeter protection to our networks and are configured to alert on suspicious activity e.g. sql injection, XSS etc.
Logs are also monitored using ManageEngine. Server Logs and Syslogs are harvested to a central reporting server and alerts are in place to notify suspicious activity such as repeated, failed administrator login attempts as well as more sophisticated events indicating exfiltration attempts. Where relevant and appropriate, GPG13 logging is implemented – by way of example we implemented this level of reporting and alerting for the Metropolitan Police.
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach CDS operate a mature Incident and Service Request Management process, certified to the ISO 20000 standard. The process is operated by our Service Management tool, which is interactive and can be configured to support the ticket workflow and metrics agreed with customers. Customers can report and update incidents via our interactive portal, email and telephone. Though we operate a core Incident Management policy and process, these can be tailored within customers Service Level Agreements to support common incidents and events. We operate a separate Major Incident Management process, which can provide incident reports, post-mortems etc., when criteria are triggered.

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £3651 per licence per month
Discount for educational organisations No
Free trial available No

Documents

Documents
Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑