Specialising in working with your organisation's data to extract extra insight.
Billigence is a reseller/partner with the leading self-service data analytics firm Alteryx.
We provide users the ability to easily prep, blend, and analyse data using a repeatable workflow, as well as build predictive models and then deploy and scale.


  • Data Extraction
  • ETL
  • Data Analysis & Design
  • Prep and Blending Data
  • Combine data from multiple sources
  • Perform advanced analytics-predictive, statistical and spatial
  • Data Manipulation
  • Drag and Drop Workflows
  • System Configration


  • Easy access to data
  • Easy-to-use self-service analytics
  • Improved insights
  • Better decision making
  • Improved performance monitoring
  • Gain deeper insights into multiple data sources
  • Easy extraction, blending, de-dupe and manipulation of data


£4155 per user per year

Service documents


G-Cloud 11

Service ID

9 8 0 5 1 5 3 8 1 4 5 1 8 3 0



Michael Evans

07951 391 823

Service scope

Software add-on or extension
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
Service constraints
Can be installed only on Windows OS.
System requirements
  • Desktop: Windows 7 or later
  • Desktop: Min. 32 Bit; 64 Bit recommended
  • Desktop: RAM: min. 4G
  • Desktop disk: 500 GD
  • Desktop chip: Dual core or Quad core
  • Server: MS Windows Server 2008R2 or higher
  • Server: 64 Bit; 32 Bit Not Supported
  • Chip: Quad Core Intel Xeon (single chip) 2.5GHz or faster
  • Server RAM: min. 16GB
  • Server disk > 1 TB

User support

Email or online ticketing support
Yes, at extra cost
Support response times
Typically and initial response is given within an hour.
Support times 9:00hrs to 17:00hrs, Monday to Friday (BST)
User can manage status and priority of support tickets
Online ticketing support accessibility
Phone support
Web chat support
Onsite support
Yes, at extra cost
Support levels
Standard support is provided to every Alteryx customer at no extra charge as part of their subscription agreement.
If you require additional on site support from a consultant, the charge is £750 per day.
Support available to third parties

Onboarding and offboarding

Getting started
- Official user documentation on the vendor website
- Interactive videos from the vendor
- Knowledge base where almost all technical questions are answered
- We provide trainings (online and onsite as well) at extra cost
Service documentation
Documentation formats
  • HTML
  • ODF
  • PDF
  • Other
Other documentation formats
  • Integrated in the workflows/macros
End-of-contract data extraction
Given the nature of this specific service the question is not applicable.
End-of-contract process
There is no additional cost at the end of the contract. The entitlement to use the software ends.

Using the service

Web browser interface
Application to install
Compatible operating systems
Designed for use on mobile devices
Service interface
Description of service interface
Available as classical application with drag and drop functionality.
Accessibility standards
Accessibility testing
No restrictions.
What users can and can't do using the API
As an interfacing tool kit, user can use virtually any standard interface to access core functionality and manage services.

API is available only for the server.
API documentation
API documentation formats
  • HTML
  • Other
API sandbox or test environment
Customisation available
Description of customisation
The service is a tool that allow user to build customised workflows that extract, prepare, manipulate, analyse, visualise and export data in any file format. User are able to build and customise workflows through configurable drag and drop technology. Any trained user with the correct access rights can create custom workflows.


Independence of resources
Server - horizontal scaling (meaning adding extra engines) then you can prioritise - giving higher priority or independent resources for users or processes which has higher priority.

Customer can purchase additional licenses as the user base grows.


Service usage metrics
Metrics types
Each workflow component can have its own timing and performance monitoring data and this can be made available to users and administrators.
Reporting types
  • API access
  • Real-time dashboards
  • Reports on request


Supplier type
Reseller providing extra support
Organisation whose services are being resold

Staff security

Staff security clearance
Staff screening not performed
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least every 6 months
Penetration testing approach
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Alteryx product allows users to export data in multiple formats via the Output data, Reporting, API Output tools
Data export formats
  • CSV
  • Other
Other data export formats
  • .flat
  • .json
  • .xls
  • .sav
  • .html
  • .sas
  • .tde, .hyper
  • .snowbl
  • .glm
  • Odbc:
Data import formats
  • CSV
  • Other
Other data import formats
  • SQL server
  • Oracle
  • Hadoop
  • Amazon Red Shift
  • SAP
  • ODBC
  • Teradata
  • Sybase
  • Text (JSON,XML,CSV,etc,..)
  • Excel

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Bonded fibre optic connections
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
Alteryx SLA
Approach to resilience
Available on request.
Outage reporting
Inclided: a public dashboard; an API; email alerts

Identity and authentication

User authentication needed
User authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
Access restriction depend on client requirements, but can include a range of authentication and control mechanisms as needed.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
How long system logs are stored for

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance approach
We follow all the industry standards and follow all clients security requirements and standards.
Information security policies and processes
All clients security policies and processes.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
The assumption has been taken that this question does not relate to the internal process and operation of the company. In terms of the release of software updates to Alteryx now operates a cadence where updates are made available roughly 4 times per year, on a quarterly basis. For the hosted solution the updates are made directly without significant downtime or loss of service to the customer.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
The Alteryx Security team cares deeply about the security of their products and the data that our customers entrust to us. We will thoroughly investigate any reported vulnerability that jeopardizes either. Once a vulnerability is fully investigated and its content addressed, we will work with you to disclose the vulnerability in a way that acknowledges your work and protects our customers. All security-related notifications will be announced to our customers.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Up to customer
Incident management type
Supplier-defined controls
Incident management approach
Incidents are reported via emails where applicable, ticket to customer support is raised where involvement of Alteryx engineers is needed.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
Connected networks
  • Public Services Network (PSN)
  • Police National Network (PNN)
  • NHS Network (N3)
  • Joint Academic Network (JANET)
  • Scottish Wide Area Network (SWAN)


£4155 per user per year
Discount for educational organisations
Free trial available
Description of free trial
14 days trial option
Link to free trial

Service documents

Return to top ↑