Converging Data

Gemini Enterprise - Autonomous Data Cloud

Gemini Enterprise enables data availability across all enterprise data so that AI can be used across diverse data sets.
It understands the complexity of underlying data silos, so you don’t have to, allowing you to focus on data analysis, including AI and ML.

Features

  • Cloud, hybrid or enterprise Deployment
  • Ability to connect to and query unstructured data lakes
  • Allows SQL query across structured and unstructured data
  • Integrates with popular BI tools like Tableau
  • Graph and SQL Explorer UIs
  • Export data in formats compatible with popular AI/ML frameworks
  • Understands the complexity of different data silos
  • Ability to host a data lake for your unstructured data

Benefits

  • Makes all data accessible to all levels of user
  • Increases ROI of Splunk/Elastic
  • Enables BI tools like Tableau to query structured/unstructured data alike
  • Comprehensive data analysis without creating another silo
  • Vast reduction in time spent acquiring and preparing data
  • No more extract, transform, load (ETL)
  • Happier, more productive data scientists
  • Data availability for Industry 4.0
  • Enables data science (AI/ML) across the enterprise
  • Can optionally provide hosting of your machine data

Pricing

£18000 per person per year

  • Education pricing available
  • Free trial available

Service documents

Framework

G-Cloud 11

Service ID

4 8 9 5 1 7 5 6 2 2 8 2 3 6 7

Contact

Converging Data

Neil Murphy

+44 113 4510 100

neil.murphy@convergingdata.com

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Tableau: Provides connection to unstructured data to Tableau
Splunk: Provides SQL query across all Splunk data
Elastic: Provides SQL query across all Elastic data
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints
Planned maintenance that would result in downtime is very rare and would be arranged in cooperation with the customer.
System requirements
  • Gemini Enterprise can run on any IaaS solution
  • Data gathering requires peer to peer access from source services

User support

Email or online ticketing support
Email or online ticketing
Support response times
PRIORITY LEVELS: P1 = Service is completely inaccessible or the majority of its functionality is unusable. P2 = One or more key features of a production Service are unusable. P3 = Any other case where a Service feature is not operating as documented.
P4=General questions about documentation, processes or procedures RFE= Requests for enhancements. RESPONSE TIMES: P1 - 4 business hours P2 - 8 business hours P3 - next business day P4 - next 2 business days RFE - next 5 business days
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
We offer one level of support for all customers of our Cloud Services. The cost of support is included in the subscription price. We have a global team of experts available around the world, we do not provide a dedicated resource to a specific customer.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Gemini has a team of experts around the globe to guide customers through the complete experience using Gemini Enterprise, from deploying to getting valuable insights. Converging Data are part of that team in the UK.

We provide deployment guides for all platforms cloud platforms. We can provide services, onsite or remote, to help integrate data sources. We can provide remote or onsite training for our solution.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Due to Gemini's patent-pending Zero-Copy technology, no customer data is held by Gemini. The exception to this is if a customer should choose to ask Gemini to additionally host their data lake in, for example, Splunk or Elastic. Then we will actively help the customer to export data in an industry- standard format that they can easily import into a different product. Depending on the circumstances, this may be JSON, csv, Splunk-data-buckets etc.
End-of-contract process
At the end of a contract, the customer is free to export their data or to ask Gemini support to export data. In the case where Gemini is exporting the data, we will choose an industry standard format (i.e. splunk-data-buckets, csv, JSON). Any customer data will then be fully deleted and the cloud instances terminated.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Firefox
  • Chrome
  • Safari 9+
Application to install
No
Designed for use on mobile devices
No
Service interface
No
API
No
Customisation available
No

Scaling

Independence of resources
Each customer has its own full-stack deployment, entirely separate from other customers.

Analytics

Service usage metrics
No

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Gemini Data

Staff security

Staff security clearance
Staff screening not performed
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Users of Gemini Enterprise can export their data in csv format. If Gemini is hosting Splunk, then users can export their data directly from Splunk or copy the data buckets to a customer device. If Gemini is hosting Elastic, then users can export the JSON data to a customer device.
Data export formats
  • CSV
  • Other
Other data export formats
  • JSON
  • Hadoop
  • SQL
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats
  • Structured & Unstructured
  • Relational Database content (oracle & SQL for example)

Data-in-transit protection

Data protection between buyer and supplier networks
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Gemini offers an SLA of 99.5% uptime for Gemini Enterprise. If SLA is not met, excepting certain exclusions specified in our Cloud Services addendum, Gemini will grant the user "n" hours of Professional Services time delivered remotely. These hours can be used to build queries, onboard data or otherwise help the customer develop solutions on and around Gemini Enterprise. The scale of hours of professional services owed is: 99.5% - 0 hours 99.0% - 2 hours 98.0% - 8 hours 95.0% - 24 hours 0.0% - 40 hours The maximum hours owed by Gemini is 40 per month
Approach to resilience
We use Public Cloud infrastructure, for example, Amazon AWS to provide the cloud infrastructure for our service. Within the chosen Public Cloud infrastructure we use its inherent high availability features to ensure uptime. Our software has built-in redundancy and monitoring 24x7
Outage reporting
Gemini uses a variety of tools to report outages. Gemini produces monthly reports detailing usage and outages on a per customer basis.

Identity and authentication

User authentication needed
Yes
User authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)
  • Username or password
  • Other
Other user authentication
Gemini software uses token-based authentication as part of our zero-trust initiative. Gemini either uses encrypted Active Directory (AD) for user authentication or we allow a customer to authenticate against their own AD.
Access restrictions in management interfaces and support channels
Gemini uses the principle of least privilege, does not share accounts, does not use any default credentials. Gemini audits all access including privilege escalation. Gemini has a password policy that mandates minimum requirements for length, complexity and reuse
Access restriction testing frequency
At least once a year
Management access authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
Gemini uses best practices to ensure services are secure and any data is protected. For example: - Data is encrypted at rest - All data in transit is encrypted - We perform regular internal and external vulnerability assessments - We have a patch management process - We have dedicated security-focused staff - We have centralised logging and security incident and event management in place - We have internal training and documentation for new hires - We subscribe to best practice principles, i.e. "least privilege", "no shared accounts", "no default creds" etc. - We have a user lifecycle process
Information security policies and processes
Gemini has a CISO who is ultimately responsible for defining and managing security process. The CISO manages a security team who perform the defined processes and ensure that users and tools are compliant.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Gemini has a weekly Change Authority Board (CAB) meeting to discuss/approve/reject proposed changes. Configurations are controlled using version control tools (details available upon request). Security is reviewed as a part of the CAB meetings. Once approved by our internal CAB and if necessary, changes are submitted to the customer for impact analysis and approval by their own CAB processes.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Gemini uses the OCTAVE Allegro methodology for risk analysis and assessment. Gemini endeavours to test and implement critical, 3rd party patches within 7 days and non-critical or internal patches with 30 days. We get threat intelligence from multiple, well-known sources.
Protective monitoring type
Undisclosed
Protective monitoring approach
Centralised event logging Monitoring for security issues Correlation with threat intelligence feeds 24x7 monitoring PRIORITY LEVELS: P1 = Service is completely inaccessible or the majority of its functionality is unusable. P2 = One or more key features of a production Service are unusable. P3 = Any other case where a Service feature is not operating as documented. P4 = General questions about documentation, processes or procedures RFE = Requests for enhancements. RESPONSE TIMES: P1 - 4 business hours P2 - 8 business hours P3 - next business day P4 - next 2 business days RFE - next 5 business days
Incident management type
Undisclosed
Incident management approach
Gemini uses a case management system and uses ITIL best practice approach to incident management. Internal users can raise cases either via email or directly using our case management system. Customers can report incidents via email, telephone or customer portal. Incident reports for customer-affecting issues will be sent to the approved customer representative for their security.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Pricing

Price
£18000 per person per year
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Gemini will provide a fully functional trial service for a limited period of time. The maximum length of the trial is usually 30 days

Service documents

Return to top ↑