Basis Technology Ltd

Text Analytics, Multilingual Name matching, Media Monitoring and OSINT

Best of breed text analytics in over 40 languages which allows users to extract intelligence from unstructured text, understand context, extract entities, entity relationship and fuzzy cross lingual name matching capabilities. Media Monitoring and OSINT allows users to find threats or additional intelligence from social media content.


  • Extract intelligence from unstructured text in 40 languages
  • Extract/link entities from multilingual text
  • Accurate fuzzy cross lingual name matching against watch-list
  • Sentiment analysis across multiple languages
  • Categorisation derived from content in many languages
  • Find threats and intelligence from social media in many languages
  • Enrich key word search in multilingual search environments
  • Cyber Intrusion Rapid Response
  • Machine Translation
  • fuzzy name matching on a laptop


  • Helps analysts to prioritise which documents to look at first
  • Find vital information from vast amount of unstructured text
  • Help border guards find people of interest without complex lists
  • Help find the unknowns for an investigator and analysts
  • Quickly find information on a device and provide data triage
  • Compare external data with internal data to find threats
  • Provide name matching on a laptop or small device
  • Ability to easily share multilingual documents across multiple departments
  • Assist in machine translation services
  • Easy tools to translate documents into English from many languages


£25000 per server per year

  • Education pricing available
  • Free trial available

Service documents

G-Cloud 9


Basis Technology Ltd

Chris Brown

0208 622 2900

Service scope

Service scope
Service constraints None of our solutions would require the system to be down for maintenance, other than updating the software which can be done out of operational hours
System requirements
  • Server with at least 8 cpu cores
  • Access to the Internet
  • Java

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Usually within 4 working hours most times quicker, we can provide weekend support at extra costs
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Onsite support
Support levels Basis has various support levels more extensive wording can be providing but basically falls into 3 categories:
1. Basis or standard fixed within 3 working days
2. Urgent fixed within 1 working day
3. Critical fixed within 4 working hours
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started We can help with integrating to other systems, customise and train our solutions and train the admin and users
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction Data is stored in your repositories so no issues with extracting data at the end of a contract
End-of-contract process The only additional costs will be if the user / organisation wishes to continue with support

Using the service

Using the service
Web browser interface Yes
Using the web interface We typically integrate to existing applications with GUI but we can also provide one to fit the user requirements
Web interface accessibility standard None or don’t know
How the web interface is accessible Various depending on application
Web interface accessibility testing Kabana
What users can and can't do using the API Users can use our API via a SaaS type service or through a API on-premise or a SDK API which can be integrated to existing applications, will work with any restful API
API automation tools Other
API documentation Yes
API documentation formats
  • HTML
  • PDF
Command line interface Yes
Command line interface compatibility
  • Linux or Unix
  • Windows
  • MacOS
Using the command line interface There should be no restrictions using a command line interface with our products


Scaling available Yes
Scaling type
  • Automatic
  • Manual
Independence of resources We will work with the different users and scope out user demands and suggest what kind of infrastructure you will need to support the user needs
Usage notifications Yes
Usage reporting
  • API
  • Email
  • Other


Infrastructure or application metrics Yes
Metrics types Other
Other metrics
  • Accuracy
  • Speed / performance
  • Alerts
  • False hits
Reporting types
  • API access
  • Real-time dashboards


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Managed by a third party
Penetration testing frequency At least every 6 months
Penetration testing approach In-house
Protecting data at rest Other
Other data at rest protection approach We use existing data controls used by the various users / organisations
Data sanitisation process No
Equipment disposal approach In-house destruction process

Backup and recovery

Backup and recovery
Backup and recovery No

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks Private network or public sector network
Data protection within supplier network Other
Other protection within supplier network We will use whatever security policies are in place by the user / organisation

Availability and resilience

Availability and resilience
Guaranteed availability Our software typically is running 100% but it depends on the application and infrastructure that is outside of our software deployment
Approach to resilience Not applicable to Basis as we use user / government datacenters
Outage reporting This can be shown via a dashboard or API

Identity and authentication

Identity and authentication
User authentication Other
Other user authentication We would use the existing organisation user authentication process
Access restrictions in management interfaces and support channels We would use existing security policies
Access restriction testing frequency Never
Management access authentication Other
Devices users manage the service through Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security accreditations No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance accreditation Yes
Security governance standards Other
Other security governance standards Unsure but can provide if required
Information security policies and processes We use exiting user / organisation policies as we typically sit in their infrastructure

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach When we update our software we let users know in advance of the improvements or bug fixes where they can make a decision to stay with current revision or upgrade
Vulnerability management type Undisclosed
Vulnerability management approach Patches or bug fixes are deployed ASAP but it all depends on the level of the problem we are trying to fix, ie: minor problem Vs critical
Protective monitoring type Undisclosed
Protective monitoring approach Not applicable to our software
Incident management type Undisclosed
Incident management approach Not really applicable to our software

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Separation between users

Separation between users
Virtualisation technology used to keep applications and users sharing the same infrastructure apart No

Energy efficiency

Energy efficiency
Energy-efficient datacentres Yes


Price £25000 per server per year
Discount for educational organisations Yes
Free trial available Yes
Description of free trial License and full support of all our products for 30 days


Pricing document View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑