Lifebit Biotech Limited

Lifebit CloudOS: Cloud-Based Unified Research Environment

The Lifebit CloudOS Unified Research Environment allows individuals, teams and large organisations to manage, run, scale, and automate big data analysis to reach maximum efficiency over cloud environments or hybrid infrastructures (HPC-Cloud).

Features

  • Federated Unified Research Environment
  • Intuitive cohort building & cohort definition sharing for data discovery
  • Out-of-the-box scaling, automation & parallelisation
  • Programmatic access to Lifebit CloudOS via API
  • Seamless import from DockerHub, Github & Bitbucket repositories
  • State-of-the-art standardised & reproducible pipelines curated by Lifebit
  • Interactive tools including JupyterLab, Integrative Genomics Viewer (IGV), among others
  • Team accounts for streamlined collaboration & management
  • Seamlessly share analysis results & parameters with team members
  • Monitoring analysis progress & costs

Benefits

  • Automation of big data analysis
  • Run federated analysis across distributed private & public datasets
  • Efficient cohort building and cohort visualisation
  • Scalable Performance with CPUs & GPUs
  • Productivity increase & reduce time-to-publication
  • Cost savings & spending limits
  • Facilitated real-time collaboration
  • Easy sharing of data analysis results & parameters
  • Reproducibility of analyses through cloning runs & FAIR standards
  • Defining data, analysis and project-access permissions within teams

Pricing

£1840 to £7700 per person per year

Service documents

Framework

G-Cloud 11

Service ID

1 3 1 6 6 4 5 8 7 0 8 5 2 3 9

Contact

Lifebit Biotech Limited

Dr. Maria Chatzou

07378294639

maria@lifebit.ai

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints
No
System requirements
  • Set up cloud account (AWS, Azure, Google Cloud, or Alibaba)
  • Provide Identity and Access Management (IAM) credentials

User support

Email or online ticketing support
Email or online ticketing
Support response times
Buyer must initially contact Supplier through the online Support channels and will receive an initial email response within 24 hours.

Support channels include:
-Through the links on the web page
-Via email to support@lifebit.ai
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), 7 days a week
Web chat support accessibility standard
WCAG 2.1 AA or EN 301 549
Web chat accessibility testing
Lifebit uses Intercom, a customer messaging platform, which is compliant with the Web Content Accessibility Guidelines 2.0 Level AA. Specifically, Intercom focuses on three main areas for accessibility with their web chat, and include:
Keyboard navigation
Screen reader support
Colour contrast
Onsite support
Yes, at extra cost
Support levels
We provide a service model based on severity of issue with different response times for each level. For critical issues we respond within 12 hrs. This can be 9-5 or 24/7 depending on Trust requirements (depending on Deploit subscription plan).
Support available to third parties
No

Onboarding and offboarding

Getting started
Users can easily set up the service through the Deploit interface, which can be accessed through https://deploit.lifebit.ai/. Creating a new account is simple, users only have to enter their name and email. Once signed up, users can either opt for 10 free credits of the Lifebit Cloud, or can link their AWS, Azure, Google Cloud or Alibaba accounts to the platform using the Identity and Access Management (IAM) credentials.

To get started, Lifebit has implemented a demo version of the Deploit platform (https://demo.lifebit.ai/) which allows users to explore the way the platform is structured, in addition to running a demo job with example parameters and data.

If required, users can read the Deploit documentation (https://lifebit.gitbook.io/deploit/) which goes into detail about how to use the platform. For more information, users are encouraged to contact our support service.
Service documentation
Yes
Documentation formats
  • HTML
  • Other
Other documentation formats
Markdown
End-of-contract data extraction
Deploit does not transfer any data, metadata, or log information out of the user's cloud account. Deploit only manages the allocation of the user's resources and never processes any information from the user's analysis or datasets.

Therefore, there is no need for users to extract their data when the contract ends. If they wish, they can simply revoke their Identity and Access Management (IAM) credentials from Deploit and from this point Deploit ceases to have access to the user's storage resources.
End-of-contract process
Since the user's cloud account is linked to Deploit, the user is responsible for revoking Deploit's access to their cloud. As soon as their cloud is disconnected from the settings field in the Deploit platform, Deploit will be detached from their account and data. Furthermore, the results generated from the data analysis via Deploit are stored on the user's cloud account storage resources. Therefore, the data generated does not need to be transferred or deleted because they always live on the user's cloud. There are no additional costs associated to disconnecting Deploit from cloud accounts.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
No
Designed for use on mobile devices
No
Service interface
Yes
Description of service interface
Users can easily set up the service through the Deploit interface, which can be accessed through https://deploit.lifebit.ai/. Creating a new account is simple, users only have to enter their name and email. Once the account has been set up, users can run their analyses directly through the Deploit web interface. If desired, users can programmatically access the Deploit platform using the Lifebit API. There are no limitations to how users can set up or make changes through the web interface.
Accessibility standards
WCAG 2.1 AA or EN 301 549
Accessibility testing
Lifebit has not performed interface testing with users of assistive technology on the Deploit platform.
API
Yes
What users can and can't do using the API
The user can generate a private API key by navigating the settings in the Deploit web Platform. They can subsequently include the key in HTTP request header to make requests. The option to register user’s endpoint to a webhook for receiving notifications is provided. The following actions can be performed by making API queries. POST request to deploy a job and select all the parameters available through GUI (select instance type, workflow, input data and parameters). GET requests for retrieving information. Request to retrieve information about specific job by providing job id. To retrieve information about all analyses Projects, this includes all the jobs associated with given Projects, including summary statistics (eg. job count per Project). Retrieve information about all available analysis workflows. Current limitations are associated with the cloud account settings. The user is not allowed to change the cloud account configuration from API, or retrieve relevant information but this is designed like so, as a security measure.
API documentation
Yes
API documentation formats
Open API (also known as Swagger)
API sandbox or test environment
No
Customisation available
Yes
Description of customisation
Customisation of the Deploit platform is included in the Enterprise package, our top offering tailored to the organisation's needs. The customised package is discussed before engagement between Lifebit and the organisation looking for a custom solution.

- Choice of public, private, hybrid cloud, or use of on-premise computing
- 24/7 bioinformatics and data analysis support
- Advanced Auditing
- Automated recommendations on best resources and data to be used for each analysis, and prediction of analysis costs and duration.

Scaling

Independence of resources
Since each user's personal cloud account is linked to the Deploit platform, the demand they place on the service is provided by their own cloud provider and not through Deploit. This ensures infinite scalability through either AWS, Azure, Google Cloud or Alibaba cloud providers.

Analytics

Service usage metrics
Yes
Metrics types
Users can refer to the start time, execution time, cost, and computational resources (instances) used for all jobs deployed through the Deploit Platform. Furthermore, after job completion, users can also access job monitor analytics (i.e. CPU and RAM usages per process in the pipeline).

For team accounts, administrators have a detailed overview of what each team member has used in terms of resources, and can also implement different spending caps for each member of the team.
Reporting types
  • API access
  • Real-time dashboards

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
European Economic Area (EEA)
User control over data storage and processing locations
Yes
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Other
Other data at rest protection approach
No physical media exist where the data are stored within Lifebit's premises. Data protection of the cloud providers' policies apply.
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Deploit utilizes Identity and Access Management (IAM) authentication, allowing the user to manage their cloud and data in a secure way.
With Deploit users' data never leaves their secure cloud environment, as Deploit does not ingest or transfer any data, metadata, or log information out of the user's environment. Deploit only manages the allocation of user resources and never processes any information from the user's analysis or datasets.
Data export formats
  • CSV
  • Other
Other data export formats
Interactive html webpage with links pointing to the results files
Data import formats
  • CSV
  • Other
Other data import formats
  • Txt
  • Vcf
  • FASTA/FASTQ
  • GFF
  • ZIP
  • Gzip
  • Json
  • BAM
  • BED
  • Deploit is agnostic, any data type can be used

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • Other
Other protection between networks
Deploit encrypts data-in-transit using NIST approved open-source cryptographic libraries.
Data protection within supplier network
Other
Other protection within supplier network
Not applicable because Deploit never transfers data.

Availability and resilience

Guaranteed availability
Lifebit commits to 99.5% uptime for Deploit. Details related to penalties for non-performance will be covered in the contract between Lifebit and the client.
Approach to resilience
This information is available on request.
Outage reporting
Any outages can be reported through an API, email alerts and/or web chat support.

Identity and authentication

User authentication needed
Yes
User authentication
  • Username or password
  • Other
Other user authentication
Identity and Access Management (IAM) credentials for linked cloud account
Access restrictions in management interfaces and support channels
Management interfaces require authentication in the form of username and password.
Access restriction testing frequency
At least once a year
Management access authentication
  • Username or password
  • Other
Description of management access authentication
Identity and Access Management (IAM) credentials

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Between 1 month and 6 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
Information security policies provide Lifebit with a framework and standards for information security program and assurance activities. Important attributes: management engagement in security governance for alignment with overall organization policies and goals; integration of security architecture with enterprise architecture; continuous evaluation the information security strategy to ensure alignment with business needs and the organization’s risk appetite; regular review of the organization’s risk appetite to ensure it continues to be appropriate for the environment in which the organization operates. Management formally approves the information security strategy, policy, and architecture to ensure appropriate implementation, coverage and maturity for security controls and processes.
Information security policies and processes
Lifebit has an Information Security Officer responsible for all aspects of security for Deploit. Policies are published and employees are mandated to sign up to the adherence of these policies on an annual basis.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Lifebit's Deploit SaaS Services change management process aligns with ITIL v3 ITSM best practices. All the changes will be tested before deployment.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
We assess vulnerability and potential test by performing biannual penetration testing and frequent reviews by an Information Security Officer.

We follow a model of continuous integration and deployment. New patches are scheduled to be deployed daily but in urgent occasions of threats Lifebit might proceed in deploying the changes as soon as possible.

Penetration testing feedback (outsourced) and reviews from Information Security Officer.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Lifebit leverages the cloud provider's security tools as the first layer of defense against unauthorized access. Alerts are reviewed on a daily basis and appropriate action is taken upon review.
Incident management type
Supplier-defined controls
Incident management approach
Lifebit has an incident management process in place. Further details will be part of master service agreement.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Pricing

Price
£1840 to £7700 per person per year
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Included (no time limit): Run analysis over own cloud account, Import any application from public and private Container/Git repositories, Curated bioinformatics pipelines, 'Out-of-the-box’ auto-scaling and automation, Sharing/monitoring data analysis, Programmatic access (API)

Not included: Cost-saving with spot instances, Team functionality, Administrator capability
Link to free trial
https://deploit.lifebit.ai/

Service documents

Return to top ↑