Data & Artificial Intelligence Cloud Solutions

Data Pillar is a Data Driven, AI & Cloud focused solution & consulting experts. Using a combination of data, technology, business intelligence, analytics and creativity, we analyse the quality and value of data and touchpoints to help companies succeed in achieving their strategic goals.


  • ML models for developers and data scientists to build
  • BI & Data Warehouse for public sector, legal, banking
  • Cloud-Based & Hybrid - Data & AI solution
  • Business Intelligence Predictive Analytics
  • Microsoft Cloud Solution & Services
  • AWS Cloud Solution & Services
  • Google Cloud Solutions & Services
  • Data Management, Single View 360 Degree and Visualisation
  • Digital Transformation & Data Alignment Strategy


  • 360 Degree view - Real time AI Consumer Marketing
  • Risk and Fraud related AI and ML reporting capabilities
  • Real-time data centric solution - a single source of truth
  • Seamless feeds for other business critical solutions
  • Classic ML algorithms, which includes classification and regression
  • Increasing the benefits from data using AI
  • Increasing strategic flexibility using AI-as-a-service
  • Risk and Legal Data Management services including Data Discovery


£600 per person per day

  • Education pricing available
  • Free trial available

Service documents


G-Cloud 11

Service ID

3 0 1 3 8 4 6 7 4 9 1 9 2 6 1



Murtaza Amirali


Service scope

Service scope
Software add-on or extension No
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints No constraints but it could vary based on client requirement or on an implementation basis.
System requirements
  • Infrastructure requirement such a virutal machine
  • Windows based operating systems
  • Software licences can be depends on additional services

User support

User support
Email or online ticketing support Yes, at extra cost
Support response times We provide 24x7 support at extra cost however weekend may take longer to response.
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support Yes, at extra cost
Support levels Urgent and Non urgent support level provided. We provide technical onward for end to end client delivery and have share support model for all live clients.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Software as a service and customisation based on the requirement. This is from Kick off session to onboarding their process, data, user onsite training and user / handover documentation.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction Extract methods will be agreed during the SoW or contract with client.
End-of-contract process It all depend on the requirement for Cloud Software. We deploy and handover all the master codes without any additional cost for this service. However if additional BAU support requires at the end of the contract then additional charges may apply.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Chrome
Application to install Yes
Compatible operating systems Windows
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Our solution based upon responsive design hence it works on mobile and desktop.
Service interface No
What users can and can't do using the API Its a self service platform leveraging Swagger UI based REST API.
User can make changes by invoking the API using industry standard API toolsets. API provides fairly all commonly used capabilities.
API documentation No
API sandbox or test environment Yes
Customisation available Yes
Description of customisation 1. Data Feeds
2. User Interface
3. Business Rules
4. Visualisation
5. Reporting

Users can customise by change request or self services based on correct training.

Anyone can customised this as long as have right technical knowledge and training.


Independence of resources Our service is fully load balancing and scale up and down based upon the user demand. We take every step to prevent one user impacting other user using the same server.


Service usage metrics Yes
Metrics types On request - Its depend based on request. Ideally usage metrics can be setup during the onboarding process.
Reporting types
  • Regular reports
  • Reports on request


Supplier type Reseller providing extra features and support
Organisation whose services are being resold Microsoft, IBM, Google, AWS services to support our core technology

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations Yes
Datacentre security standards Managed by a third party
Penetration testing frequency At least once a year
Penetration testing approach In-house
Protecting data at rest Scale, obfuscating techniques, or data storage sharding
Data sanitisation process Yes
Data sanitisation type Explicit overwriting of storage before reallocation
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach Data is available within our platform/solution which can be accessed via various technology tools. Export option is available in visualisation platform.
Data export formats
  • CSV
  • Other
Other data export formats
  • CSV
  • XML
  • SQL
Data import formats
  • CSV
  • Other
Other data import formats
  • CSV
  • XML
  • SQL
  • Excel

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability SLA varies based upon the environment and requirements of each customer.

We aim to provide 95% availability for test environment and good availability for production environment. We discuss the Level of availability / guarantee during our discussion and if this is business critical.
Approach to resilience This information is available on request.
Outage reporting Notification platform has been build in this order.
1. Email Notification
2. API flag to confirm if services are down / outages
3. Dashboard - which can display message regarding outages.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
Access restrictions in management interfaces and support channels It will be persona driven restrict access by on different interfaces and portal applications.
Access restriction testing frequency At least once a year
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach Practices / standard for security governance.

1. Take a holistic approach to strategy
2. Create awareness and training throughout the organisation.
3. Monitor and measure
4. Establish open communication between all stakeholders
5. Promote agility and adaptability
Information security policies and processes The primary information security policy is issued by the company to ensure that all employees who use information technology assets within the breadth of the organization, or its networks, comply with its stated rules and guidelines.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach 1. Assess the Scope of the Change i.e. how big is this change including people and process effects?
2. Assess the Readiness of the Organization Impacted by the Change.
3. Effective Communication
4. Sponsor Activities and Sponsor Roadmaps
5. Change Management Training for Managers
6. Training Development and Delivery
7. Employee Feedback and Corrective Action
Vulnerability management type Supplier-defined controls
Vulnerability management approach This above 3 process managed and control by third party services and Supplier-defined controls by our internal development dashboard to see the logs.
Protective monitoring type Supplier-defined controls
Protective monitoring approach We have incident dashboard which is constantly monitored by team.
Incident management type Supplier-defined controls
Incident management approach Pre-defined processed and controlled by user reporting / ticketing process for any incidents.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No


Price £600 per person per day
Discount for educational organisations Yes
Free trial available Yes
Description of free trial One day workshop with client including limited R&D based on complexity and terms and condition.

Service documents

Return to top ↑