Mammoth Analytics

Data Management Platform

Mammoth Analytics is a self-service platform with powerful tools to transform, analyze and gain insights on complex data without any coding.
We aim to empower technical and non-technical users to improve their data preparation, quality and analysis capabilities with a user-friendly interface.

Features

  • Real-time data analysis
  • Real-time data mining
  • Automated, flexible and transparent data workflows
  • Data management without coding
  • Comprehensive data preparation and transformation toolkit
  • Data sharing and exporting
  • Prescriptive alerts (when data meets pre-set conditions)
  • Data summarising and representation capabilities
  • Remote access
  • Data blending and consolidation capabilities

Benefits

  • Reduce data preparation time through automated workflows
  • Empower users to manage their data with our non-coding interface
  • Centralise your data in one place (APIs, webhooks, blending tools)
  • Improve data flow efficiency and timeliness of analysis
  • Share the value of data assets by lowering skills barrier
  • Get on-demand and personalised data insights for each team/job
  • Structure unstructured data, reducing data scientists' efforts
  • Visually explore the shape of data
  • Improve the quality of data
  • Automate data reconciliation

Pricing

£25 per licence per month

Service documents

Framework

G-Cloud 11

Service ID

2 6 7 6 9 4 5 6 6 9 6 8 0 3 3

Contact

Mammoth Analytics

Gaurav Dudhoria

4407500049317

bd@mammoth.io

Service scope

Service scope
Software add-on or extension No
Cloud deployment model
  • Public cloud
  • Private cloud
Service constraints Our service is available 24/7. However, we inform our users before conducting maintenance or software releases that could interfere with the normal service.
System requirements
  • Google Chrome, Mozilla Firefox or Safari
  • Desktop, laptop or tablet
  • Internet connection

User support

User support
Email or online ticketing support Email or online ticketing
Support response times We provide a 4h response time during U.K. office hours. Questions and tickets posted during non-office hours are answered on the next working day.
Mission critical support is available subject to requirements and may incur additional fees.
User can manage status and priority of support tickets No
Phone support No
Web chat support Web chat
Web chat support availability 9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard None or don’t know
How the web chat support is accessible We are evaluating our webchat provider and its accessibility practices with a view to comply with WCAG 2.0 AAA.
Web chat accessibility testing We have not conducted any test with assistive technology users.
Onsite support Onsite support
Support levels Our customer support is divided by:
-Basic support: Our baseline support level includes:
Self-service support via in-app help, tutorials, and documentation. Support for basic customer issues and fulfilling service desk requests that need IT involvement.
Experienced and knowledgeable technicians assess issues and provide solutions for problems that cannot be handled by tier 1.
-Mission critical support: includes all of the above plus a 2-hour response time (UK office hours). This is standard with our Corporate and Enterprise service plans.
-Technical account manager: is provided on demand with our Enterprise Plan.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started In-app, we provide:
-Hints and tips
-Example of use for each feature
-Guided tour
On our website and social media platforms, we provide:
-Documentation (on our website, but accessible within the app)
-Customer support (via web chat)
-Use cases and video tutorials.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction Users can download or export their data at any point during the subscription period (while the contract is active).
Our export options include:
Direct download: CSV file.
APIs: users may export their data to other databases or platforms. The export intervals are customisable.
Live CSV: The user can get a link to a CSV which will always be updated with the view's data.
End-of-contract process As Mammoth Analytics operates via subscription (under the SaaS model), when the subscription ends, most of the platform's functionalities are restricted. However, we keep the information for 15 days and enable the user to download her data.
Any other requirements come at an extra cost.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Firefox
  • Chrome
  • Safari 9+
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service -Desktop service: Full functionality. The user can perform any data manipulation from the desktop and web browser.
-Tablets: Full functionality. The user can perform any data manipulation from tablets and web browser.
-Mobile phones: currently no access. Subject to market demand we may develop a mobile phone interface for appropriate features.
Service interface No
API Yes
What users can and can't do using the API We have a Python software development kit (SDK), however, this is not generally available (beta ). The API offers full functionality, as an example, users can:
-upload data
- create datasets
- create views
- apply transforms
- create metrics
- send alerts
- export data.
API documentation Yes
API documentation formats PDF
API sandbox or test environment No
Customisation available Yes
Description of customisation We offer professional services for customisation.

Scaling

Scaling
Independence of resources We host our service via Amazon Web Services to ensure the continuity of service, no matter how much demand we have. We have the capabilities to manage our processing and storage needs. Our process is automatic and scalable.

Analytics

Analytics
Service usage metrics No

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • EU-US Privacy Shield agreement locations
User control over data storage and processing locations No
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least every 6 months
Penetration testing approach In-house
Protecting data at rest
  • Encryption of all physical media
  • Other
Other data at rest protection approach Users' data is stored as encrypted files in Amazon Web Services’ servers. This encryption ensures that if the disks where your information lives are isolated and re-mounted elsewhere they cannot be read.
Data sanitisation process Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach Users may export data in the following ways:
-Direct download of CSV file
-CSV live link (file updates in real-time as new batches of data are pulled into Mammoth)
-APIs: programmed exports through several APIs connecting to databases and other tools.
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats ANSI SQL
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats ANSI SQL

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Other
Other protection within supplier network All the data exchange between a client (browser/scripts) and Mammoth is encrypted. The encryption uses Transport layer security (TLS) protocol using Secure hash algorithm (SHA) 256-bit algorithm with a 128-bit encryption key which practically makes reading any data over the network impossible.
Each customer account is assigned a separate database of its own with its password. Databases are stored as files in encrypted volumes on AWS. Disks are isolated, and if re-mounted elsewhere they cannot be read. The decryption keys are part of the isolated production deployment inaccessible to anyone other than individuals authorized by our security council.

Availability and resilience

Availability and resilience
Guaranteed availability If the service is interrupted, customers will be charged up to the proportion of time the service was running properly within the month.
Approach to resilience Our deployments are on Amazon web services (AWS). This means you get all the benefits of world-class compliance programs on physical data center, network, and storage security. The AWS infrastructure puts strong safeguards in place to help protect the privacy of data.
AWS’s security measures are verified by independent auditors who ensure that specific security controls are in place and are functioning correctly. AWS has achieved ISO 27001 certification for IT security techniques, and have been validated as a Level 1 service provider under the Payment Card Industry’s Data Security Standard. AWS undergoes annual SOC 1 audits.
Outage reporting We report outages via email and via in-app messages.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password
Access restrictions in management interfaces and support channels Login process generates an API token. The token is specific to the user who has logged in and gives the user controlled access to authorised data. Tokens can be made to expire after few minutes of inactivity in a browser or can be to stay longer if the user chooses ‘Remember me’ on login. Users can log in from any number of devices. Mammoth would send you periodic report on devices and activities. Mammoth also show account activity in the bottom bar of the application.
Access restriction testing frequency At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for Between 6 months and 12 months
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for Between 6 months and 12 months
How long system logs are stored for Between 1 month and 6 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach We have a Security Council which controls the keys, defines and approves security policy and ensures compliance and best practices towards maintaining a secure data environment at Mammoth. It continuously reviews the organizational practices in the following areas:
-Application and interface security
-Audit assurance and compliance
-Business continuity management
-Change control and configuration management
-Data security and information life-cycle management
-Encryption and key management
-Identity and access management
-Infrastructure and virtualization security
-Interoperability and portability
-Mobility and security
-Security incident management
-Threat and vulnerability management
Information security policies and processes All access to the production servers is controlled and monitored by the Security Council. A very small number of authorized users can access these servers with due permission from the council. Access keys are replaced periodically.
Our Security Council controls the keys, defines and approves security policy and ensures compliance and best practices towards maintaining a data secure environment at Mammoth. Security council continuously reviews the organizational practices

Operational security

Operational security
Configuration and change management standard Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach The software source components are managed through a stringent three-tier version control process using GitHub. The defects are tracked through Defect control software and are closely tied to the version control process. Every change mandatorily goes through an intensive testing process before acceptance into the production version. The code is reviewed extensively for security-related issues based on established coding guidelines.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Our threat assessment measures:
-Self-assessment through log monitoring
-Subscription to security bulletins of all libraries and operating system resources used
-Patching the servers within hours of discovering the threat
We get information regarding potential threats from:
-cve.mitre.org
-usn.ubuntu.com
-github notifications on based on source scans
-https://www.npmjs.com/advisories
-bugs.python.org
-Other sources as identified
Protective monitoring type Supplier-defined controls
Protective monitoring approach Identification of potential compromises:
-Monitoring logs
-Identifying any kind of access anomalies
Response to potential compromise:
Our Security Council has a well-defined process for the same and usually, fixes are deployed within hours of detection.
Incident management type Supplier-defined controls
Incident management approach Incident capture: Incidents are captured from various probes with a special lookout for any unusual activity. Regular monitoring activity on the infrastructure is performed by a team trained for analyzing security breaches.
Incident reporting: Incidents involving any user data breach are classified as such and we notify the user to take corrective actions with clear guidance on damage risk mitigation advice for the customers.
Users can report incidents through all of out communication and support channels (web chat, email, in-app help centre, etc.)

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £25 per licence per month
Discount for educational organisations Yes
Free trial available Yes
Description of free trial We offer a 15-day free trial which grants access to the platform's full functionalities.
If the trial is started with the Starter Plan, no additional users can be included in the account (the Plan might be changed during the subscription period).
Link to free trial https://mammoth.io/pricing

Service documents

Return to top ↑