Data & Artificial Intelligence Cloud Solutions

Data Pillar is a Data Driven, AI & Cloud focused solution & consulting experts. Using a combination of data, technology, business intelligence, analytics and creativity, we analyse the quality and value of data and touchpoints to help companies succeed in achieving their strategic goals.


  • Data Analytics & BI for Public Sector, Legal, Banking, Retail
  • Cloud-Based & Hybrid - Data & AI solution
  • Microsoft Business Intelligence & Predictive Analytics
  • Digital Transformation & Data Alignment Strategy
  • Conversational AI Chatbot - Integrate with Cloud / On-Premise
  • CDP - Customer Data Platform & Master Data Management
  • Marketing Automation & Real-Time Segmentation
  • Microsoft Azure - Machine Learning (Python and R)
  • AWS & Google Cloud Solution
  • RPA (Robotic Automation Software)


  • CDP - Personalised Customer Experience & Increase Conversions
  • Risk and Fraud related AI and ML reporting capabilities
  • Real-time data centric solution - a single source of truth
  • 360 Degree view - Real time AI Consumer Marketing
  • Conversational AI chatbot has the ability to increase customer satisfaction
  • Seamless feeds for other business critical solutions
  • Risk and Legal Data Management services including Data Discovery
  • Increasing the benefits from data using AI
  • Increasing strategic flexibility using AI-as-a-service


£550 to £950 a person a day

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 12

Service ID

2 5 4 4 1 9 4 2 9 8 7 0 6 6 0


Telephone: 07932861213

Service scope

Software add-on or extension
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints
No constraints
System requirements
  • Operating Systems
  • On-Premise and Cloud requirement such as VMs.
  • Software licences can be depends on additional solutions and services

User support

Email or online ticketing support
Yes, at extra cost
Support response times
We provide 24x7 support at extra cost however weekend may take longer to response.
User can manage status and priority of support tickets
Online ticketing support accessibility
None or don’t know
Phone support
Phone support availability
24 hours, 7 days a week
Web chat support
Onsite support
Yes, at extra cost
Support levels
Urgent and Non urgent support level provided. We provide technical onward for end to end client delivery and have share support model for all live clients.
Support available to third parties

Onboarding and offboarding

Getting started
Software as a service and custom solutions based on the requirement. This is from Kick off session to onboarding their process, data management / solution, user onsite training and user / handover documentation.
Service documentation
Documentation formats
End-of-contract data extraction
Extract methods will be agreed in the contract with client since this varies based upon client requirement.
End-of-contract process
It depend s upon the requirement for Cloud Software. We deploy and handover all the solution without any additional cost for this service. However if additional BAU support requires at the end of the contract then additional charges may apply.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Compatible operating systems
Designed for use on mobile devices
Differences between the mobile and desktop service
Our solution based upon responsive design hence it works on mobile and desktop.
Service interface
What users can and can't do using the API
Its a self service platform leveraging Swagger UI based REST API. User can make changes by invoking the API using industry standard API toolsets. API provides fairly all commonly used capabilities.
API documentation
API sandbox or test environment
Customisation available
Description of customisation
1. Multiple Data Feeds
2. User Interface
3. Business Rules
4. Data Management
5. Visualisation & Reporting


Independence of resources
Our service is fully load balancing and scale up and down based upon the user demand. We take every step to prevent one user impacting other user using the same server.


Service usage metrics
Metrics types
Cloud ML, Predictive & Analytics solutions
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Microsoft, AWS, Google, IBM Watson services to support our technologies.

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
Protecting data at rest
Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Data is available within our platform/solution which can be accessed via various technology tools. Several export options are available in platform.
Data export formats
  • CSV
  • Other
Other data export formats
  • XML
  • Flat file
Data import formats
  • CSV
  • Other
Other data import formats
  • XML
  • Excel

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
SLA varies based upon the environment and requirements of each customer. We aim to provide 95% availability for test environment and 99% availability for production environment.
Approach to resilience
This information is available on request.
Outage reporting
Notification platform has been build in this order.
1. Email Notification
2. API flag to confirm if services are down / outages
3. Dashboard - which can display message regarding outages.

Identity and authentication

User authentication needed
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels
It will be persona driven restrict access by on different interfaces and portal applications.
Access restriction testing frequency
At least once a year
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
Between 6 months and 12 months

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance approach
Practices / standard for security governance.
1. Take a holistic approach to strategy
2. Create awareness and training throughout the organisation.
3. Monitor and measure
4. Establish open communication between all stakeholders
5. Promote agility and adaptability
Information security policies and processes
The primary information security policy is issued by the company to ensure that all employees who use information technology assets within the breadth of the organization, or its networks, comply with its stated rules and guidelines.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
1. Assess the Scope of the Change i.e. how big is this change including people and process effects?
2. Assess the Readiness of the Organization Impacted by the Change.
3. Effective Communication
4. Sponsor Activities and Sponsor Roadmaps
5. Change Management Training for Managers
6. Training Development and Delivery
7. Employee Feedback and Corrective Action
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
This above 3 process managed and control by third party services and Supplier-defined controls by our internal development dashboard to see the logs.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
We have incident dashboard which is constantly monitored by team.
Incident management type
Supplier-defined controls
Incident management approach
Pre-defined processed and controlled by user reporting / ticketing process for any incidents.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks


£550 to £950 a person a day
Discount for educational organisations
Free trial available
Description of free trial
One day workshop with client including limited R&D based on complexity and terms and condition.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.