DATA PILLAR LIMITED

Data & Artificial Intelligence Cloud Solutions

Data Pillar is a Data Driven, AI & Cloud focused solution & consulting experts. Using a combination of data, technology, business intelligence, analytics and creativity, we analyse the quality and value of data and touchpoints to help companies succeed in achieving their strategic goals.

Features

  • Data Analytics & BI for Public Sector, Legal, Banking, Retail
  • Cloud-Based & Hybrid - Data & AI solution
  • Microsoft Business Intelligence & Predictive Analytics
  • Digital Transformation & Data Alignment Strategy
  • Conversational AI Chatbot - Integrate with Cloud / On-Premise
  • CDP - Customer Data Platform & Master Data Management
  • Marketing Automation & Real-Time Segmentation
  • Microsoft Azure - Machine Learning (Python and R)
  • AWS & Google Cloud Solution
  • RPA (Robotic Automation Software)

Benefits

  • CDP - Personalised Customer Experience & Increase Conversions
  • Risk and Fraud related AI and ML reporting capabilities
  • Real-time data centric solution - a single source of truth
  • 360 Degree view - Real time AI Consumer Marketing
  • Conversational AI chatbot has the ability to increase customer satisfaction
  • Seamless feeds for other business critical solutions
  • Risk and Legal Data Management services including Data Discovery
  • Increasing the benefits from data using AI
  • Increasing strategic flexibility using AI-as-a-service

Pricing

£550 to £950 a person a day

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at mamirali@datapillar.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 12

Service ID

2 5 4 4 1 9 4 2 9 8 7 0 6 6 0

Contact

DATA PILLAR LIMITED Murtaza Amirali
Telephone: 07932861213
Email: mamirali@datapillar.co.uk

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints
No constraints
System requirements
  • Operating Systems
  • On-Premise and Cloud requirement such as VMs.
  • Software licences can be depends on additional solutions and services

User support

Email or online ticketing support
Yes, at extra cost
Support response times
We provide 24x7 support at extra cost however weekend may take longer to response.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Urgent and Non urgent support level provided. We provide technical onward for end to end client delivery and have share support model for all live clients.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Software as a service and custom solutions based on the requirement. This is from Kick off session to onboarding their process, data management / solution, user onsite training and user / handover documentation.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
Extract methods will be agreed in the contract with client since this varies based upon client requirement.
End-of-contract process
It depend s upon the requirement for Cloud Software. We deploy and handover all the solution without any additional cost for this service. However if additional BAU support requires at the end of the contract then additional charges may apply.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Yes
Compatible operating systems
Windows
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Our solution based upon responsive design hence it works on mobile and desktop.
Service interface
No
API
Yes
What users can and can't do using the API
Its a self service platform leveraging Swagger UI based REST API. User can make changes by invoking the API using industry standard API toolsets. API provides fairly all commonly used capabilities.
API documentation
No
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
1. Multiple Data Feeds
2. User Interface
3. Business Rules
4. Data Management
5. Visualisation & Reporting

Scaling

Independence of resources
Our service is fully load balancing and scale up and down based upon the user demand. We take every step to prevent one user impacting other user using the same server.

Analytics

Service usage metrics
Yes
Metrics types
Cloud ML, Predictive & Analytics solutions
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Microsoft, AWS, Google, IBM Watson services to support our technologies.

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
In-house
Protecting data at rest
Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Data is available within our platform/solution which can be accessed via various technology tools. Several export options are available in platform.
Data export formats
  • CSV
  • Other
Other data export formats
  • XML
  • EXCEL
  • Flat file
Data import formats
  • CSV
  • Other
Other data import formats
  • XML
  • Excel

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
SLA varies based upon the environment and requirements of each customer. We aim to provide 95% availability for test environment and 99% availability for production environment.
Approach to resilience
This information is available on request.
Outage reporting
Notification platform has been build in this order.
1. Email Notification
2. API flag to confirm if services are down / outages
3. Dashboard - which can display message regarding outages.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels
It will be persona driven restrict access by on different interfaces and portal applications.
Access restriction testing frequency
At least once a year
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
Between 6 months and 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
Practices / standard for security governance.
1. Take a holistic approach to strategy
2. Create awareness and training throughout the organisation.
3. Monitor and measure
4. Establish open communication between all stakeholders
5. Promote agility and adaptability
Information security policies and processes
The primary information security policy is issued by the company to ensure that all employees who use information technology assets within the breadth of the organization, or its networks, comply with its stated rules and guidelines.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
1. Assess the Scope of the Change i.e. how big is this change including people and process effects?
2. Assess the Readiness of the Organization Impacted by the Change.
3. Effective Communication
4. Sponsor Activities and Sponsor Roadmaps
5. Change Management Training for Managers
6. Training Development and Delivery
7. Employee Feedback and Corrective Action
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
This above 3 process managed and control by third party services and Supplier-defined controls by our internal development dashboard to see the logs.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
We have incident dashboard which is constantly monitored by team.
Incident management type
Supplier-defined controls
Incident management approach
Pre-defined processed and controlled by user reporting / ticketing process for any incidents.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Pricing

Price
£550 to £950 a person a day
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
One day workshop with client including limited R&D based on complexity and terms and condition.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at mamirali@datapillar.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.