Infosys Limited

Infosys Artificial Intelligence - Automation Plaform NIA on cloud

Infosys Nia is Purposeful AI based Enterprise Automation Platform which offers automation, Predictive, Prescriptive Analytics,Knowledge based Cognitive Automation to provide up to 30% reduction in TCO. Collects, aggregates, transforms organizational information; , processes and legacy systems; Supports multiple flexible hosting options such as On-Premise, Private, Public and Hybrid Cloud deployments.

Features

  • Discover subsystem - capabilities for extraction, storage and provisioning
  • Learn subsystem : applying machine learning, natural language processing
  • Sense subsystem has a set of Run-time capabilities
  • Respond subsystem in performing tasks like automation, prediction selfhealing issues
  • Data Platform - open-source data analytics, M/L platform
  • Knowledge Platform-capture, formalize, and process knowledge
  • Automation Platform - RPA, Predictive Automation, Cognitive Automation

Benefits

  • Semi-assisted, Robotic, Cognitive, Predictive and Touch-less automation
  • Ability to keep track of business processes in real time
  • Provides an integrated view of process, application, and infrastructure stack
  • Continuous improvement and integrated service delivery outcomes
  • Advance Machine Learning to solve business problems
  • Software Robots to automate any high-touch, repetitive processes
  • Ability to analyze ITSM tickets, application error, alert logs
  • Ability to capture knowledge like application source code, database schema
  • Automate repetitive tasks, transforms systems and processes

Pricing

£275 per person per day

Service documents

G-Cloud 10

463334380138936

Infosys Limited

David Burgess

+44 7985663029

ukps@infosys.com

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Hybrid cloud
Service constraints Analytics on historical business data to learn patterns for data discrepancies
> Integration with ITSM systems
> Availability of SMEs and knowledge throughout the engagement
> Availability of infrastructure (software + hardware) to host Nia in DEV,TEST & PROD environments
> Approve movement of data to enable activation of the Nia use case
Ensure access to source systems in DEV & PROD environment
System requirements Available on request

User support

User support
Email or online ticketing support Yes, at extra cost
Support response times Can be discussed
User can manage status and priority of support tickets No
Phone support No
Web chat support Yes, at an extra cost
Web chat support availability 24 hours, 7 days a week
Web chat support accessibility standard None or don’t know
How the web chat support is accessible N/A
Web chat accessibility testing N/A
Onsite support Onsite support
Support levels We have different support models (support during working hours (8*5), 24*5, 24*7). Depending on client needs and business criticality of application, we jointly decide on optimum support model.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Yes, Using user manuals. Training is provided at an extra cost.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction Data is owned by the client and can be exported via database backup/export mechanism for metadata and HDFS snapshots or file system level backups to restore as needed.
End-of-contract process We do proper transition and transfer the project.
Price of the contract will have licensing and servicing cost. AMC cost will be separate.

Using the service

Using the service
Web browser interface Yes
Supported browsers Chrome
Application to install No
Designed for use on mobile devices No
Accessibility standards None or don’t know
Description of accessibility Not Applicable
Accessibility testing Not Applicable
API Yes
What users can and can't do using the API We can use it to integrate with third party products or platform or bespoke applications. Depending upon the requirement, users can create custom extensions.
We provide documentation as required by the client.
We give access to test environment during PoC stage.
API documentation Yes
API documentation formats PDF
API sandbox or test environment No
Customisation available Yes
Description of customisation Platform has been built with several open APIs. Depending upon the additional functionality needed, custom extensions can be created.
Typically someone with programming skills to build APIs should be able to create such extensions.

Scaling

Scaling
Independence of resources We use efficient load balancing to ensure that user don’t face issues.

Analytics

Analytics
Service usage metrics Yes
Metrics types Application dashboards are available and can be customized.
Cloud service usage metrics are not provided within Nia.
Reporting types Reports on request

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations Other locations
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach ‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest Other
Other data at rest protection approach Infosys Nia uses HDFS and native encryption features available within Apache Hadoop for data stored within HDFS. Additionally, Nia and its components can be customized easily for working with encrypting/ decrypting data in For encryption in transit, Nia and its components can be configured to employ SSL for all communications between components - SSL on web services and web application.the database as well as the file system as needed.HDFS native encryption can be utilized for all data ingested.Minimum RSA 2048 bit is used to generate crypto keys. AES 256 or equivalent algorithm is used wherever applicable.
Data sanitisation process No
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach Data primarily resides either in Hadoop or Postgres. Metadata mainly resides in PostgreSQL relational database. Depending upon the objects/data to be exported, specific options can be explored. E.g. ML models can be exported as PMML. Certain automation workflows can be exported as BPMN.
Data export formats Other
Other data export formats Depends on Nia component from which data is being exported
Data import formats Other
Other data import formats Depends on the component of Infosys Nia

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks Other
Other protection between networks 1. HDFS data can be encrypted at rest
(https://hadoop.apache.org/docs/r2.7.2/hadoop-project-dist/hadoop-hdfs/TransparentEncryption.html)
2. HTTPS protocol with TLS followed for data in transit
Data protection within supplier network Other
Other protection within supplier network 1. HDFS data can be encrypted at rest
(https://hadoop.apache.org/docs/r2.7.2/hadoop-project-dist/hadoop-hdfs/TransparentEncryption.html)
2. HTTPS protocol with TLS followed for data in transit

Availability and resilience

Availability and resilience
Guaranteed availability SLAs are application specific
Approach to resilience Available on request
Outage reporting Public dashboard, Email Alerts, API

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels All application access is role based and will be configured and managed by security administrator.
Also, the user authentication can also be integrated with corporate security frameworks such as LDAP.
Access restriction testing frequency At least every 6 months
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information No audit information available
Access to supplier activity audit information No audit information available
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 ISO 27001:2013
ISO/IEC 27001 accreditation date Provision of IT solutions, services, consulting and management of processes
What the ISO/IEC 27001 doesn’t cover Scope of certification: Provision of IT solutions, services, consulting and management of processes, systems and supporting infrastructure as per business, legal and contractual requirements of stakeholders including customers as per the latest statement of applicability.
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards Other
Other security governance standards Infosys as an organization is aligned and certified to ISO 27001:2013 which is an Industry recognized information security standard.
Information security policies and processes Infosys’ Information Security Policy framework is aligned and certified to ISO 27001:2013 Information Security Standard. The information security framework is supported by a set of supplementary policies, procedures & standards aimed at achieving the enterprise level information security objectives
The Information Security Policy provides an overview of the below areas:
1. Security Governance
2. Security Management
3. Security Measurement And Improvement
4. Risk Management
5. Supplier Risk Management
6. Threat And Incident Management
7. Technical Security Management
8. Asset Management
9. People Management
10. System Access
11. Physical And Environmental Security
12. System Acquisition, Development And Maintenance
13. Operations Management
14. Networks And Communications

Infosys' Intranet has all the polices readily available for all the employees. Significant changes to the policies are notified to all employees via email. Also, weekly tip mails related to Information Security are sent to all the employees which also contain links to relevant policies.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Any new releases of Nia will go through an internal validation process.
Deployment of new versions of Nia releases will follow the Change Mangement Process mandated by customer's change management process. Any custom development or objects creation will also follow the Dev-UAT-Prod migration cycle as per the standard change management process in effect.
Vulnerability management type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach Infosys has a well defined vulnerability assessment program in place inline with ISO 27001:2013 standard to assess the vulnerabilities in its infrastructure & applications. Regular penetration testing is conducted on sample internet facing infrastructure and applications by ISG as well as an independent external agency. Penetration Testing exercise will be conducted every quarter on Corporate Critical Infrastructure & Applications. External agency will be engaged every alternate quarters (once in 6 months).
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach InfyGamia (Security Awareness): - interactive awareness game to gain knowledge about Infosys Information Security practices in real life scenarios.
Cyber Fusion Center (CFC): A comprehensive, integrated approach to security. Built with multi-disciplined approach that integrates cyber threat intelligence with security, technology operations • Security Operations Center (SOC): Providing security event monitoring, detection analysis, incident handling, forensic analysis
• Threat Defense: Maintaining ,enhancing the security stack; developing threat rules, signatures; conducting proactive, retrospective hunt activities, malware analysis, and reverse engineering
• Threat Intelligence Platform [TIP] with Commercial Security Intel feeds (Flash Point, Recorded Future, iSight Partners) and open source intel feeds.
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach Support process will be clearly documented within the license and support agreement.
In summary, a Jira portal access will be provided to authoized users to log any incidents and the support team will respond to such tickets as per the severity of the issue reported.

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £275 per person per day
Discount for educational organisations No
Free trial available Yes
Description of free trial We will happy to arrange a demo of the solution and also consider a use case for POC based on business requirements
Link to free trial N/A

Documents

Documents
Pricing document View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑