Adarga Ltd

Adarga BENCH

BENCH is the single home for your textual data and analytical insight, built to combine the best of machine learning and human analysis. It aggregates data, provides seamless discovery, audit-able workflow and pushes insights specific to the defence sector. Empowering the analyst and manager to conduct credible quantifiable intelligence investigations.

Features

  • Browser based, no installation required.
  • Sector specific proprietary natural language processing named entity recognition system.
  • Near real-time news alerting and feed monitoring.
  • Collaboration on shared projects and reports.
  • Automatically generated configurable entity visualisations.
  • Overview data metric visualisations.

Benefits

  • Data led OSINT investigations.
  • Reduce human bias.
  • Standardised OSINT approach across analytical teams.
  • Collaborate to collect, process, analyse and disseminate as a team.
  • Automatically extract value from unstructured data.
  • Actionable intelligence in near real time.
  • Single user interface for multiple open sources.
  • Recommendations on related content to speed discovery and understanding.
  • Quantifiable coverage of sources and factors included in assessments.
  • Output research in standardised compatible formats.

Pricing

£699 per licence per month

  • Free trial available

Service documents

G-Cloud 10

718427760613032

Adarga Ltd

Louise West

0203 907 4153

hello@adarga.ai

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Public cloud
Service constraints There are no service constraints.
System requirements
  • Modern Web Browser required (Google Chrome recommended).
  • Client machine running vendor supported operating system.
  • Minimum 2GB RAM.

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Priority 1 within one hour.
Standard - Weekdays: 0900-1700
24/7 available on request.
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support Yes, at an extra cost
Web chat support availability 9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard None or don’t know
How the web chat support is accessible Web chat system has not been tested for accessibility at this time.
Web chat accessibility testing Web chat system has not been tested for with assistive technology users at this time.
Onsite support Yes, at extra cost
Support levels Maintenance is included in the software agreement and entitles you to the services based on our standard service level outlined in the support contract.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started We provide full technical system set-up support. From a user perspective the BENCH is built to be self-service, meaning that users can intuitively use the platform without consultant support or set-up. Ongoing training and support is provided both remotely or in-person and is encouraged so that we can constantly improve our platform and user experience.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction User data extraction is a standard feature of the product. The extraction of raw source content is subject to specific licensing agreements with third party data providers. From a technical perspective all data can be extracted in a standard open format.
End-of-contract process Annual or bi-annual rolling contract with the ability to prior to the end of each contract period.

Using the service

Using the service
Web browser interface Yes
Supported browsers Chrome
Application to install No
Designed for use on mobile devices No
Accessibility standards None or don’t know
Description of accessibility BENCH has not yet been tested or assessed for accessibility.
Accessibility testing BENCH has not yet been tested or assessed for accessibility.
API No
Customisation available Yes
Description of customisation Customisation is possible at the data integration and analytics level. For data, we have connectors to various sources internally, proprietary 3rd party premium sources and webscraped content which can be delivered into the system. For webscraped content we have access to millions of daily article flows from thousands of sources across more than 200 countries. Analytic and machine learning capabilities can be plugged into the system, these may be either Adarga proprietary or select 3rd party capabilities.

Scaling

Scaling
Independence of resources The solution utilises a highly scalable dynamic provisioning system, which responds to user volume and demand to deliver the service to the agreed level at all times.

Analytics

Analytics
Service usage metrics No

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach We enable users to download specific content, interactions and notes in structured format, to enable auditable workflow management. Furthermore organisations can request full export of their content.
Data export formats Other
Other data export formats DOCX
Data import formats Other
Other data import formats
  • DOCX
  • JSON
  • HTML
  • TXT
  • PDF

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability As part of the Hosted Service, we will take all reasonable measures to keep uptime at or above 98%.
Approach to resilience We provide multiple levels of redundancy in Google Container engine, including automated failover and rebuilds of the system. All databases are clustered, with snapshots taken at regular intervals.
Outage reporting We provide multiple levels of reporting through an API.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels Access Control Lists (ACLs)
Policies and Procedures
Access restriction testing frequency At least once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 British Assessment Bureau
ISO/IEC 27001 accreditation date 5/10/2017
What the ISO/IEC 27001 doesn’t cover N/A
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications Cyber Essentials

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes ISO 27001

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Change and configuration is tracked in accordance with ISO 27001, documented on internal change management policy, including an Asset Management Register covering all: hardware, software and data.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Conduct internal vulnerability scanning as part of our continuous delivery lifecycle.
Proactively monitor our services, systems and networks.
Monitor national government, product and specific vendor vulnerability databases.
Protective monitoring type Supplier-defined controls
Protective monitoring approach Continuous monitoring, logging, auditing and alerting.
If a compromise is suspected, the internal Incident Response Plan is enacted.
Suspected incidents are categorised, reported and responded to accordingly.
Incident management type Undisclosed
Incident management approach The Incident Management Policy defines response actions and processes for all event types.
Incidents can be reported via the standard reporting processes and channels.
Post Incident Reports are produced in accordance with the Incident Management Policy, these can be made available upon request.

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £699 per licence per month
Discount for educational organisations No
Free trial available Yes
Description of free trial Trial users gain access to all main major functionality of the tool, except collaboration and the ability to include their own specific data.

Service documents

pdf document: Pricing document pdf document: Skills Framework for the Information Age rate card pdf document: Service definition document pdf document: Terms and conditions
Service documents
Return to top ↑