Lifebit Biotech Limited

Lifebit CloudOS: Cloud-Based Trusted Research Environment

The Lifebit CloudOS Trusted Research Environment allows individuals, teams and large organisations to manage, run, scale, and automate big data analysis to reach maximum efficiency over cloud environments or hybrid infrastructures (HPC-Cloud).


  • Federated Job Execution
  • Import public & private DockerHub, Github & Bitbucket repositories
  • Standardised & reproducible pipelines/workflows curated by Lifebit
  • Out-of-the-box scaling, automation & parallelisation
  • Programmatic access to Deploit via API
  • Real-time alerts & access to detailed reports on cost savings
  • Artificial Intelligence (AI) enabled prediction of analysis cost & duration
  • Team accounts for easy collaboration and management
  • Seamlessly share data analyses with team members
  • Monitoring analysis progress & costs


  • Automation of big data analysis
  • Maximise research efficiency
  • Scalability
  • Time-efficiency
  • Cost savings
  • Enabling collaboration
  • Easy sharing of data analysis results
  • Reproducibility of analyses through cloning runs
  • Respecting spending limits with spend caps
  • Defining data, analysis and project-access permissions


£1840 to £7700 per person per year

Service documents

G-Cloud 11


Lifebit Biotech Limited

Dr. Maria Chatzou


Service scope

Service scope
Software add-on or extension No
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints No
System requirements
  • Set up cloud account (AWS, Azure, Google Cloud, or Alibaba)
  • Provide Identity and Access Management (IAM) credentials

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Buyer must initially contact Supplier through the online Support channels and will receive an initial email response within 24 hours.

Support channels include:
-Through the links on the web page
-Via email to
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support Web chat
Web chat support availability 9 to 5 (UK time), 7 days a week
Web chat support accessibility standard WCAG 2.1 AA or EN 301 549
Web chat accessibility testing Lifebit uses Intercom, a customer messaging platform, which is compliant with the Web Content Accessibility Guidelines 2.0 Level AA. Specifically, Intercom focuses on three main areas for accessibility with their web chat, and include:
Keyboard navigation
Screen reader support
Colour contrast
Onsite support Yes, at extra cost
Support levels We provide a service model based on severity of issue with different response times for each level. For critical issues we respond within 12 hrs. This can be 9-5 or 24/7 depending on Trust requirements (depending on Deploit subscription plan).
Support available to third parties No

Onboarding and offboarding

Onboarding and offboarding
Getting started Users can easily set up the service through the Deploit interface, which can be accessed through Creating a new account is simple, users only have to enter their name and email. Once signed up, users can either opt for 10 free credits of the Lifebit Cloud, or can link their AWS, Azure, Google Cloud or Alibaba accounts to the platform using the Identity and Access Management (IAM) credentials.

To get started, Lifebit has implemented a demo version of the Deploit platform ( which allows users to explore the way the platform is structured, in addition to running a demo job with example parameters and data.

If required, users can read the Deploit documentation ( which goes into detail about how to use the platform. For more information, users are encouraged to contact our support service.
Service documentation Yes
Documentation formats
  • HTML
  • Other
Other documentation formats Markdown
End-of-contract data extraction Deploit does not transfer any data, metadata, or log information out of the user's cloud account. Deploit only manages the allocation of the user's resources and never processes any information from the user's analysis or datasets.

Therefore, there is no need for users to extract their data when the contract ends. If they wish, they can simply revoke their Identity and Access Management (IAM) credentials from Deploit and from this point Deploit ceases to have access to the user's storage resources.
End-of-contract process Since the user's cloud account is linked to Deploit, the user is responsible for revoking Deploit's access to their cloud. As soon as their cloud is disconnected from the settings field in the Deploit platform, Deploit will be detached from their account and data. Furthermore, the results generated from the data analysis via Deploit are stored on the user's cloud account storage resources. Therefore, the data generated does not need to be transferred or deleted because they always live on the user's cloud. There are no additional costs associated to disconnecting Deploit from cloud accounts.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices No
Service interface Yes
Description of service interface Users can easily set up the service through the Deploit interface, which can be accessed through Creating a new account is simple, users only have to enter their name and email. Once the account has been set up, users can run their analyses directly through the Deploit web interface. If desired, users can programmatically access the Deploit platform using the Lifebit API. There are no limitations to how users can set up or make changes through the web interface.
Accessibility standards WCAG 2.1 AA or EN 301 549
Accessibility testing Lifebit has not performed interface testing with users of assistive technology on the Deploit platform.
What users can and can't do using the API The user can generate a private API key by navigating the settings in the Deploit web Platform. They can subsequently include the key in HTTP request header to make requests. The option to register user’s endpoint to a webhook for receiving notifications is provided. The following actions can be performed by making API queries. POST request to deploy a job and select all the parameters available through GUI (select instance type, workflow, input data and parameters). GET requests for retrieving information. Request to retrieve information about specific job by providing job id. To retrieve information about all analyses Projects, this includes all the jobs associated with given Projects, including summary statistics (eg. job count per Project). Retrieve information about all available analysis workflows. Current limitations are associated with the cloud account settings. The user is not allowed to change the cloud account configuration from API, or retrieve relevant information but this is designed like so, as a security measure.
API documentation Yes
API documentation formats Open API (also known as Swagger)
API sandbox or test environment No
Customisation available Yes
Description of customisation Customisation of the Deploit platform is included in the Enterprise package, our top offering tailored to the organisation's needs. The customised package is discussed before engagement between Lifebit and the organisation looking for a custom solution.

- Choice of public, private, hybrid cloud, or use of on-premise computing
- 24/7 bioinformatics and data analysis support
- Advanced Auditing
- Automated recommendations on best resources and data to be used for each analysis, and prediction of analysis costs and duration.


Independence of resources Since each user's personal cloud account is linked to the Deploit platform, the demand they place on the service is provided by their own cloud provider and not through Deploit. This ensures infinite scalability through either AWS, Azure, Google Cloud or Alibaba cloud providers.


Service usage metrics Yes
Metrics types Users can refer to the start time, execution time, cost, and computational resources (instances) used for all jobs deployed through the Deploit Platform. Furthermore, after job completion, users can also access job monitor analytics (i.e. CPU and RAM usages per process in the pipeline).

For team accounts, administrators have a detailed overview of what each team member has used in terms of resources, and can also implement different spending caps for each member of the team.
Reporting types
  • API access
  • Real-time dashboards


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations European Economic Area (EEA)
User control over data storage and processing locations Yes
Datacentre security standards Supplier-defined controls
Penetration testing frequency At least once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest Other
Other data at rest protection approach No physical media exist where the data are stored within Lifebit's premises. Data protection of the cloud providers' policies apply.
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach In-house destruction process

Data importing and exporting

Data importing and exporting
Data export approach Deploit utilizes Identity and Access Management (IAM) authentication, allowing the user to manage their cloud and data in a secure way.
With Deploit users' data never leaves their secure cloud environment, as Deploit does not ingest or transfer any data, metadata, or log information out of the user's environment. Deploit only manages the allocation of user resources and never processes any information from the user's analysis or datasets.
Data export formats
  • CSV
  • Other
Other data export formats Interactive html webpage with links pointing to the results files
Data import formats
  • CSV
  • Other
Other data import formats
  • Txt
  • Vcf
  • GFF
  • ZIP
  • Gzip
  • Json
  • BAM
  • BED
  • Deploit is agnostic, any data type can be used

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • Other
Other protection between networks Deploit encrypts data-in-transit using NIST approved open-source cryptographic libraries.
Data protection within supplier network Other
Other protection within supplier network Not applicable because Deploit never transfers data.

Availability and resilience

Availability and resilience
Guaranteed availability Lifebit commits to 99.5% uptime for Deploit. Details related to penalties for non-performance will be covered in the contract between Lifebit and the client.
Approach to resilience This information is available on request.
Outage reporting Any outages can be reported through an API, email alerts and/or web chat support.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • Username or password
  • Other
Other user authentication Identity and Access Management (IAM) credentials for linked cloud account
Access restrictions in management interfaces and support channels Management interfaces require authentication in the form of username and password.
Access restriction testing frequency At least once a year
Management access authentication
  • Username or password
  • Other
Description of management access authentication Identity and Access Management (IAM) credentials

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for Between 1 month and 6 months
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach Information security policies provide Lifebit with a framework and standards for information security program and assurance activities. Important attributes: management engagement in security governance for alignment with overall organization policies and goals; integration of security architecture with enterprise architecture; continuous evaluation the information security strategy to ensure alignment with business needs and the organization’s risk appetite; regular review of the organization’s risk appetite to ensure it continues to be appropriate for the environment in which the organization operates. Management formally approves the information security strategy, policy, and architecture to ensure appropriate implementation, coverage and maturity for security controls and processes.
Information security policies and processes Lifebit has an Information Security Officer responsible for all aspects of security for Deploit. Policies are published and employees are mandated to sign up to the adherence of these policies on an annual basis.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Lifebit's Deploit SaaS Services change management process aligns with ITIL v3 ITSM best practices. All the changes will be tested before deployment.
Vulnerability management type Supplier-defined controls
Vulnerability management approach We assess vulnerability and potential test by performing biannual penetration testing and frequent reviews by an Information Security Officer.

We follow a model of continuous integration and deployment. New patches are scheduled to be deployed daily but in urgent occasions of threats Lifebit might proceed in deploying the changes as soon as possible.

Penetration testing feedback (outsourced) and reviews from Information Security Officer.
Protective monitoring type Supplier-defined controls
Protective monitoring approach Lifebit leverages the cloud provider's security tools as the first layer of defense against unauthorized access. Alerts are reviewed on a daily basis and appropriate action is taken upon review.
Incident management type Supplier-defined controls
Incident management approach Lifebit has an incident management process in place. Further details will be part of master service agreement.

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Public sector networks
Connection to public sector networks No


Price £1840 to £7700 per person per year
Discount for educational organisations Yes
Free trial available Yes
Description of free trial Included (no time limit): Run analysis over own cloud account, Import any application from public and private Container/Git repositories, Curated bioinformatics pipelines, 'Out-of-the-box’ auto-scaling and automation, Sharing/monitoring data analysis, Programmatic access (API)

Not included: Cost-saving with spot instances, Team functionality, Administrator capability
Link to free trial

Service documents

pdf document: Pricing document pdf document: Service definition document pdf document: Terms and conditions
Service documents
Return to top ↑