Converging Data

Gemini Enterprise - Autonomous Data Cloud

Gemini Enterprise enables data availability across all enterprise data so that AI can be used across diverse data sets.
It understands the complexity of underlying data silos, so you don’t have to, allowing you to focus on data analysis, including AI and ML.

Features

  • Cloud, hybrid or enterprise Deployment
  • Ability to connect to and query unstructured data lakes
  • Allows SQL query across structured and unstructured data
  • Integrates with popular BI tools like Tableau
  • Graph and SQL Explorer UIs
  • Export data in formats compatible with popular AI/ML frameworks
  • Understands the complexity of different data silos
  • Ability to host a data lake for your unstructured data

Benefits

  • Makes all data accessible to all levels of user
  • Increases ROI of Splunk/Elastic
  • Enables BI tools like Tableau to query structured/unstructured data alike
  • Comprehensive data analysis without creating another silo
  • Vast reduction in time spent acquiring and preparing data
  • No more extract, transform, load (ETL)
  • Happier, more productive data scientists
  • Data availability for Industry 4.0
  • Enables data science (AI/ML) across the enterprise
  • Can optionally provide hosting of your machine data

Pricing

£18000 per person per year

  • Education pricing available
  • Free trial available

Service documents

G-Cloud 11

489517562282367

Converging Data

Neil Murphy

+44 113 4510 100

neil.murphy@convergingdata.com

Service scope

Service scope
Software add-on or extension Yes, but can also be used as a standalone service
What software services is the service an extension to Tableau: Provides connection to unstructured data to Tableau
Splunk: Provides SQL query across all Splunk data
Elastic: Provides SQL query across all Elastic data
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints Planned maintenance that would result in downtime is very rare and would be arranged in cooperation with the customer.
System requirements
  • Gemini Enterprise can run on any IaaS solution
  • Data gathering requires peer to peer access from source services

User support

User support
Email or online ticketing support Email or online ticketing
Support response times PRIORITY LEVELS: P1 = Service is completely inaccessible or the majority of its functionality is unusable. P2 = One or more key features of a production Service are unusable. P3 = Any other case where a Service feature is not operating as documented.
P4=General questions about documentation, processes or procedures RFE= Requests for enhancements. RESPONSE TIMES: P1 - 4 business hours P2 - 8 business hours P3 - next business day P4 - next 2 business days RFE - next 5 business days
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels We offer one level of support for all customers of our Cloud Services. The cost of support is included in the subscription price. We have a global team of experts available around the world, we do not provide a dedicated resource to a specific customer.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Gemini has a team of experts around the globe to guide customers through the complete experience using Gemini Enterprise, from deploying to getting valuable insights. Converging Data are part of that team in the UK.

We provide deployment guides for all platforms cloud platforms. We can provide services, onsite or remote, to help integrate data sources. We can provide remote or onsite training for our solution.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction Due to Gemini's patent-pending Zero-Copy technology, no customer data is held by Gemini. The exception to this is if a customer should choose to ask Gemini to additionally host their data lake in, for example, Splunk or Elastic. Then we will actively help the customer to export data in an industry- standard format that they can easily import into a different product. Depending on the circumstances, this may be JSON, csv, Splunk-data-buckets etc.
End-of-contract process At the end of a contract, the customer is free to export their data or to ask Gemini support to export data. In the case where Gemini is exporting the data, we will choose an industry standard format (i.e. splunk-data-buckets, csv, JSON). Any customer data will then be fully deleted and the cloud instances terminated.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 11
  • Firefox
  • Chrome
  • Safari 9+
Application to install No
Designed for use on mobile devices No
API No
Customisation available No

Scaling

Scaling
Independence of resources Each customer has its own full-stack deployment, entirely separate from other customers.

Analytics

Analytics
Service usage metrics No

Resellers

Resellers
Supplier type Reseller providing extra features and support
Organisation whose services are being resold Gemini Data

Staff security

Staff security
Staff security clearance Staff screening not performed
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Managed by a third party
Penetration testing frequency At least once a year
Penetration testing approach ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach Users of Gemini Enterprise can export their data in csv format. If Gemini is hosting Splunk, then users can export their data directly from Splunk or copy the data buckets to a customer device. If Gemini is hosting Elastic, then users can export the JSON data to a customer device.
Data export formats
  • CSV
  • Other
Other data export formats
  • JSON
  • Hadoop
  • SQL
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats
  • Structured & Unstructured
  • Relational Database content (oracle & SQL for example)

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability Gemini offers an SLA of 99.5% uptime for Gemini Enterprise. If SLA is not met, excepting certain exclusions specified in our Cloud Services addendum, Gemini will grant the user "n" hours of Professional Services time delivered remotely. These hours can be used to build queries, onboard data or otherwise help the customer develop solutions on and around Gemini Enterprise. The scale of hours of professional services owed is: 99.5% - 0 hours 99.0% - 2 hours 98.0% - 8 hours 95.0% - 24 hours 0.0% - 40 hours The maximum hours owed by Gemini is 40 per month
Approach to resilience We use Public Cloud infrastructure, for example, Amazon AWS to provide the cloud infrastructure for our service. Within the chosen Public Cloud infrastructure we use its inherent high availability features to ensure uptime. Our software has built-in redundancy and monitoring 24x7
Outage reporting Gemini uses a variety of tools to report outages. Gemini produces monthly reports detailing usage and outages on a per customer basis.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)
  • Username or password
  • Other
Other user authentication Gemini software uses token-based authentication as part of our zero-trust initiative. Gemini either uses encrypted Active Directory (AD) for user authentication or we allow a customer to authenticate against their own AD.
Access restrictions in management interfaces and support channels Gemini uses the principle of least privilege, does not share accounts, does not use any default credentials. Gemini audits all access including privilege escalation. Gemini has a password policy that mandates minimum requirements for length, complexity and reuse
Access restriction testing frequency At least once a year
Management access authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach Gemini uses best practices to ensure services are secure and any data is protected. For example: - Data is encrypted at rest - All data in transit is encrypted - We perform regular internal and external vulnerability assessments - We have a patch management process - We have dedicated security-focused staff - We have centralised logging and security incident and event management in place - We have internal training and documentation for new hires - We subscribe to best practice principles, i.e. "least privilege", "no shared accounts", "no default creds" etc. - We have a user lifecycle process
Information security policies and processes Gemini has a CISO who is ultimately responsible for defining and managing security process. The CISO manages a security team who perform the defined processes and ensure that users and tools are compliant.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Gemini has a weekly Change Authority Board (CAB) meeting to discuss/approve/reject proposed changes. Configurations are controlled using version control tools (details available upon request). Security is reviewed as a part of the CAB meetings. Once approved by our internal CAB and if necessary, changes are submitted to the customer for impact analysis and approval by their own CAB processes.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Gemini uses the OCTAVE Allegro methodology for risk analysis and assessment. Gemini endeavours to test and implement critical, 3rd party patches within 7 days and non-critical or internal patches with 30 days. We get threat intelligence from multiple, well-known sources.
Protective monitoring type Undisclosed
Protective monitoring approach Centralised event logging Monitoring for security issues Correlation with threat intelligence feeds 24x7 monitoring PRIORITY LEVELS: P1 = Service is completely inaccessible or the majority of its functionality is unusable. P2 = One or more key features of a production Service are unusable. P3 = Any other case where a Service feature is not operating as documented. P4 = General questions about documentation, processes or procedures RFE = Requests for enhancements. RESPONSE TIMES: P1 - 4 business hours P2 - 8 business hours P3 - next business day P4 - next 2 business days RFE - next 5 business days
Incident management type Undisclosed
Incident management approach Gemini uses a case management system and uses ITIL best practice approach to incident management. Internal users can raise cases either via email or directly using our case management system. Customers can report incidents via email, telephone or customer portal. Incident reports for customer-affecting issues will be sent to the approved customer representative for their security.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £18000 per person per year
Discount for educational organisations Yes
Free trial available Yes
Description of free trial Gemini will provide a fully functional trial service for a limited period of time. The maximum length of the trial is usually 30 days

Service documents

pdf document: Pricing document pdf document: Skills Framework for the Information Age rate card pdf document: Service definition document pdf document: Terms and conditions
Service documents
Return to top ↑