BENCH is the single home for your textual data and analytical insight, built to combine the best of machine learning and human analysis. It aggregates data, provides seamless discovery, audit-able workflow and pushes insights specific to the defence sector. Empowering the analyst and manager to conduct credible quantifiable intelligence investigations.
- Browser based, no installation required.
- Sector specific proprietary natural language processing named entity recognition system.
- Near real-time news alerting and feed monitoring.
- Collaboration on shared projects and reports.
- Automatically generated configurable entity visualisations.
- Overview data metric visualisations.
- Data led OSINT investigations.
- Reduce human bias.
- Standardised OSINT approach across analytical teams.
- Collaborate to collect, process, analyse and disseminate as a team.
- Automatically extract value from unstructured data.
- Actionable intelligence in near real time.
- Single user interface for multiple open sources.
- Recommendations on related content to speed discovery and understanding.
- Quantifiable coverage of sources and factors included in assessments.
- Output research in standardised compatible formats.
£699 per licence per month
- Free trial available
- Pricing document
- Skills Framework for the Information Age rate card
- Service definition document
- Terms and conditions
0203 907 4153
|Software add-on or extension||No|
|Cloud deployment model||Public cloud|
|Service constraints||There are no service constraints.|
|Email or online ticketing support||Email or online ticketing|
|Support response times||
Priority 1 within one hour.
Standard - Weekdays: 0900-1700
24/7 available on request.
|User can manage status and priority of support tickets||Yes|
|Online ticketing support accessibility||None or don’t know|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||Yes, at an extra cost|
|Web chat support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support accessibility standard||None or don’t know|
|How the web chat support is accessible||Web chat system has not been tested for accessibility at this time.|
|Web chat accessibility testing||Web chat system has not been tested for with assistive technology users at this time.|
|Onsite support||Yes, at extra cost|
|Support levels||Maintenance is included in the software agreement and entitles you to the services based on our standard service level outlined in the support contract.|
|Support available to third parties||Yes|
Onboarding and offboarding
|Getting started||We provide full technical system set-up support. From a user perspective the BENCH is built to be self-service, meaning that users can intuitively use the platform without consultant support or set-up. Ongoing training and support is provided both remotely or in-person and is encouraged so that we can constantly improve our platform and user experience.|
|End-of-contract data extraction||User data extraction is a standard feature of the product. The extraction of raw source content is subject to specific licensing agreements with third party data providers. From a technical perspective all data can be extracted in a standard open format.|
|End-of-contract process||Annual or bi-annual rolling contract with the ability to prior to the end of each contract period.|
Using the service
|Web browser interface||Yes|
|Application to install||No|
|Designed for use on mobile devices||No|
|Accessibility standards||None or don’t know|
|Description of accessibility||BENCH has not yet been tested or assessed for accessibility.|
|Accessibility testing||BENCH has not yet been tested or assessed for accessibility.|
|Description of customisation||Customisation is possible at the data integration and analytics level. For data, we have connectors to various sources internally, proprietary 3rd party premium sources and webscraped content which can be delivered into the system. For webscraped content we have access to millions of daily article flows from thousands of sources across more than 200 countries. Analytic and machine learning capabilities can be plugged into the system, these may be either Adarga proprietary or select 3rd party capabilities.|
|Independence of resources||The solution utilises a highly scalable dynamic provisioning system, which responds to user volume and demand to deliver the service to the agreed level at all times.|
|Service usage metrics||No|
|Supplier type||Not a reseller|
|Staff security clearance||Conforms to BS7858:2012|
|Government security clearance||Up to Developed Vetting (DV)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||United Kingdom|
|User control over data storage and processing locations||Yes|
|Datacentre security standards||Complies with a recognised standard (for example CSA CCM version 3.0)|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||Another external penetration testing organisation|
|Protecting data at rest||
|Data sanitisation process||Yes|
|Data sanitisation type||
|Equipment disposal approach||Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001|
Data importing and exporting
|Data export approach||We enable users to download specific content, interactions and notes in structured format, to enable auditable workflow management. Furthermore organisations can request full export of their content.|
|Data export formats||Other|
|Other data export formats||DOCX|
|Data import formats||Other|
|Other data import formats||
|Data protection between buyer and supplier networks||TLS (version 1.2 or above)|
|Data protection within supplier network||TLS (version 1.2 or above)|
Availability and resilience
|Guaranteed availability||As part of the Hosted Service, we will take all reasonable measures to keep uptime at or above 98%.|
|Approach to resilience||We provide multiple levels of redundancy in Google Container engine, including automated failover and rebuilds of the system. All databases are clustered, with snapshots taken at regular intervals.|
|Outage reporting||We provide multiple levels of reporting through an API.|
Identity and authentication
|User authentication needed||Yes|
|Access restrictions in management interfaces and support channels||
Access Control Lists (ACLs)
Policies and Procedures
|Access restriction testing frequency||At least once a year|
|Management access authentication||
Audit information for users
|Access to user activity audit information||Users contact the support team to get audit information|
|How long user audit data is stored for||User-defined|
|Access to supplier activity audit information||Users contact the support team to get audit information|
|How long supplier audit data is stored for||User-defined|
|How long system logs are stored for||User-defined|
Standards and certifications
|ISO/IEC 27001 certification||Yes|
|Who accredited the ISO/IEC 27001||British Assessment Bureau|
|ISO/IEC 27001 accreditation date||5/10/2017|
|What the ISO/IEC 27001 doesn’t cover||N/A|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||Yes|
|Any other security certifications||Cyber Essentials|
|Named board-level person responsible for service security||Yes|
|Security governance certified||Yes|
|Security governance standards||ISO/IEC 27001|
|Information security policies and processes||ISO 27001|
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||Change and configuration is tracked in accordance with ISO 27001, documented on internal change management policy, including an Asset Management Register covering all: hardware, software and data.|
|Vulnerability management type||Supplier-defined controls|
|Vulnerability management approach||
Conduct internal vulnerability scanning as part of our continuous delivery lifecycle.
Proactively monitor our services, systems and networks.
Monitor national government, product and specific vendor vulnerability databases.
|Protective monitoring type||Supplier-defined controls|
|Protective monitoring approach||
Continuous monitoring, logging, auditing and alerting.
If a compromise is suspected, the internal Incident Response Plan is enacted.
Suspected incidents are categorised, reported and responded to accordingly.
|Incident management type||Undisclosed|
|Incident management approach||
The Incident Management Policy defines response actions and processes for all event types.
Incidents can be reported via the standard reporting processes and channels.
Post Incident Reports are produced in accordance with the Incident Management Policy, these can be made available upon request.
|Approach to secure software development best practice||Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)|
Public sector networks
|Connection to public sector networks||No|
|Price||£699 per licence per month|
|Discount for educational organisations||No|
|Free trial available||Yes|
|Description of free trial||Trial users gain access to all main major functionality of the tool, except collaboration and the ability to include their own specific data.|