Basis Technology Ltd

AI, NLP, Text Analytics, Multilingual Name matching, OSINT, Fake News

We offer a full AWS hosted NLP solution but this can also be deployed on-site as a SaaS solution for security reasons. We have developed a OSINT application to help detect social unrest, along with fake news tools


  • Extract intelligence from unstructured text in 40 languages
  • Extract/link entities from multilingual text
  • Accurate fuzzy cross lingual name matching against watch-list
  • Sentiment analysis across multiple languages
  • Cross Lingual Semantic Search
  • Categorisation derived from content in many languages
  • Find threats and intelligence from social media in many languages
  • fuzzy name matching on a laptop
  • OSINT look for social unrest on social media
  • Find fake news


  • Helps analysts to prioritise which documents to look at first
  • Find vital information from vast amount of unstructured text
  • Help border guards find people of interest without complex lists
  • Help find the unknowns for an investigator and analysts
  • Quickly find information on a device and provide data triage
  • Compare external data with internal data to find threats
  • Provide name matching on a laptop or small device
  • share multilingual documents across multiple repositories
  • Find information that is semantically linked across languages
  • Remove manual process on existing tools such as i2


£10000 to £200000 per server per month

Service documents


G-Cloud 11

Service ID

3 2 6 6 6 1 9 3 7 4 2 3 4 9 6


Basis Technology Ltd

Chris Brown

0208 622 2900

Service scope

Service constraints
None of our tools should cause any issues other than when we provide software updates that are typically initially installed on the test server so down time is limited
System requirements
  • Our software has very little system requirements
  • Will work on most platforms and operating systems

User support

Email or online ticketing support
Email or online ticketing
Support response times
Depends on which SLA is signed up to but typically within 8 hours
User can manage status and priority of support tickets
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Yes, at an extra cost
Web chat support availability
9 to 5 (UK time), 7 days a week
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
We would develop this to the user requirements.
Web chat accessibility testing
None to date as none of our clients have requested this
Onsite support
Yes, at extra cost
Support levels
We can provide a full SLA that will describe all our levels of support that we offer
Support available to third parties

Onboarding and offboarding

Getting started
We provide full documentation, and can provide on-site training at a extra cost we can even train 3rd parties
Service documentation
Documentation formats
End-of-contract data extraction
All data is stored on-site
End-of-contract process
At the end of the contract we plan in advance to help clients migrate from our platform to the new environment

Using the service

Web browser interface
Using the web interface
Typically users can make web calls to our services
Web interface accessibility standard
None or don’t know
How the web interface is accessible
Web services via restful API's
Web interface accessibility testing
None to date
What users can and can't do using the API
We provide restful API's in Java
API automation tools
API documentation
API documentation formats
Command line interface
Command line interface compatibility
  • Linux or Unix
  • Windows
  • MacOS
Using the command line interface
We offer full command line capabilities


Scaling available
Scaling type
Independence of resources
We plan on what the throughput requirements are and plan against that and review on a regular basis with the users
Usage notifications
Usage reporting
  • API
  • Other


Infrastructure or application metrics
Metrics types
  • Number of active instances
  • Other
Other metrics
  • Accuracy
  • Throughput
Reporting types
  • API access
  • Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Staff screening not performed
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
  • United Kingdom
  • Other locations
User control over data storage and processing locations
Datacentre security standards
Managed by a third party
Penetration testing frequency
Protecting data at rest
Physical access control, complying with another standard
Data sanitisation process
Equipment disposal approach
A third-party destruction service

Backup and recovery

Backup and recovery

Data-in-transit protection

Data protection between buyer and supplier networks
Other protection between networks
Typically data is stored on premise
Data protection within supplier network
IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
We will provide our SLA to anyone upon request
Approach to resilience
On-prem solution
Outage reporting
Work with client as on-prem

Identity and authentication

User authentication
Username or password
Access restrictions in management interfaces and support channels
Because we provide API's and SDK and we are typically integrated into a application we would use that access management
Access restriction testing frequency
At least once a year
Management access authentication
Username or password
Devices users manage the service through
Dedicated device over multiple services or networks

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
Other security governance standards
Not sure will have to check upon request
Information security policies and processes
Will provide upon request

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
We provide updates 2-4 times per year and each time we publish in advance what these changes are and the user can determine if they want to update
Vulnerability management type
Vulnerability management approach
Not applicable
Protective monitoring type
Protective monitoring approach
Monitored by our IT team
Incident management type
Incident management approach
Not applicable

Secure development

Approach to secure software development best practice
Supplier-defined process

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart

Energy efficiency

Energy-efficient datacentres
Description of energy efficient datacentres
This is done by a 3rd party


£10000 to £200000 per server per month
Discount for educational organisations
Free trial available
Description of free trial
Free software and support for 30 days
Link to free trial

Service documents

Return to top ↑