Acuma Solutions Limited

Machine learning as a Service

Acuma provides Machine Learning as a Service with a library of machine learning algorithms well-connected to visualization tools, accelerating time to insights. The service includes machine learning techniques to predict KPIs across industries to provide advanced analytics solutions to augment successful business outcomes.


  • Integration with a range of external systems
  • Visualized web interface facilitating drag and drop of components
  • Facilitates complete workflow pertaining to data modelling and application
  • Algorithm components including classification, regression, text analysis, clustering, time series
  • Neural networks/deep learning models
  • Loading public URLs, Cloud storage systems, or CSV/ARFF files
  • Facilitates anomaly detection saving time and money
  • Chabot interfaces and APIs


  • Infrastructure to house and manage at low costs
  • Complete development environment to meet Data Science requirements
  • Pick and choose required capabilities
  • Cost reduction through automation
  • Enhance security of critical tasks


£7834 per unit

Service documents

G-Cloud 10


Acuma Solutions Limited

Jonathan Eeley

0161 241 4321

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Public cloud
Service constraints No
System requirements
  • Browsers – IE 8+, Chrome, FireFox or Safari 9+ (any)
  • 8 GB RAM and 100 MB available space

User support

User support
Email or online ticketing support Yes, at extra cost
Support response times Support available Monday through Friday 9am to 5pm UK time excluding UK public holidays
1 Critical: Issue with very serious consequences for normal business transactions. Initial Response Time (IRT) - 1 Hour. Maximum Processing time – 24 hrs
2 High: Issue inhibiting a user within a specific function. IRT – 2 hours. Maximum processing time – 4 days
3 Medium: Issue not seriously affecting a user and does not require immediate attention. IRT – 4 hours. Maximum processing time – 8 days
4 Low: Cosmetic issues and information . IRT– 24 hours. Maximum processing time – 16 days
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels Our support covers technical support and guidance, end-user reported issues, root cause analysis and resolution to issues. Coverage includes, email, fax and phone support.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Our consultancy expertise facilitates onboarding of users while the engagement gets initiated. Acuma services range from configuration and deployment to user training, support and documentation.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction At the end of the engagement, data can be extracted by means of export through CSV / Zip files, or data can be downloaded leveraging JSON format.
End-of-contract process Once the contract comes to an end, access to the system is discontinued.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 10
  • Firefox
  • Chrome
  • Safari 9+
Application to install No
Designed for use on mobile devices No
Accessibility standards WCAG 2.0 AAA
Accessibility testing Web interfaces that are part of the solution are tested.
What users can and can't do using the API Users need to make service call by including the URL along with the required parameters. By invoking this API, selected models will be executed on the data sets. While there are no limitations, users will have to follow the API document for the acceptable formats.
API documentation Yes
API documentation formats
  • Open API (also known as Swagger)
  • ODF
  • PDF
API sandbox or test environment Yes
Customisation available Yes
Description of customisation Our services allow customisations of the machine learning models as well as visualizations in line with the specific purposes that they are being used for.


Independence of resources This service is based upon some of the most scalable-based architecture providers like AWS and Hadoop. We also follow a micro-service based architecture that ensures that inter-dependencies like shared databases and other architecture scaling issues do not exist.


Service usage metrics Yes
Metrics types To be decided once the contract is drawn.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Supplier-defined controls
Penetration testing frequency Never
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Encryption of all physical media
Data sanitisation process No
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach Acuma enables data export through a REST API.
Data export formats
  • CSV
  • Other
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability We have 99% availability during normal business hours.
Approach to resilience Information available on request
Outage reporting Email alerts

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels Access provided for accounts with relevant permissions.
Access restriction testing frequency At least once a year
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users receive audit information on a regular basis
How long user audit data is stored for User-defined
Access to supplier activity audit information Users receive audit information on a regular basis
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach We take cues from the ISO/IEC 27001:2005 specification wherever possible and have a strong Information Security Policy in place.
Information security policies and processes We adhere to Information Security Policy that can be made available on request.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Our configuration and change management approach embraces version control for all software components, processes and documentation. Assessment of changes are made against design documentation and threat intelligence, and potential security impacts are identified.
Vulnerability management type Supplier-defined controls
Vulnerability management approach We leverage internally defined processes to monitor potential threats proactively through various sources, including external repositories.
Protective monitoring type Supplier-defined controls
Protective monitoring approach We leverage robust techniques, technologies and tools for identifying threats and rolling out relevant measures depending on the complexity, nature and severity as a specific case may demand.
Incident management type Supplier-defined controls
Incident management approach Our incident management processes adhere to industry standard best practice to capture as well as manage events. Users can make use of channels including email and phone for reporting incidents.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No


Price £7834 per unit
Discount for educational organisations No
Free trial available No

Service documents

pdf document: Pricing document pdf document: Skills Framework for the Information Age rate card pdf document: Service definition document pdf document: Terms and conditions
Service documents
Return to top ↑