Basis Technology Ltd

Text Analytics, Multilingual Name matching, Media Monitoring and OSINT

Best of breed text analytics in over 40 languages that allows users to extract intelligence from unstructured text, understand context, extract entities, entity relationship and fuzzy cross lingual name matching capabilities. Media Monitoring and OSINT allow users to find threats or additional intelligence from public and social media content.

Features

  • Extract intelligence from unstructured text in 40+ languages
  • Extract/link entities from multilingual text without lists or rules
  • Accurate fuzzy cross lingual name matching against watch-list
  • Sentiment analysis across multiple languages
  • Categorisation derived from content in many languages
  • Find threats and intelligence from social media in many languages
  • Enrich key word search in multilingual search environments
  • Fuzzy name matching on a laptop
  • Identity resolution
  • Cross Lingual Semantic Search

Benefits

  • Helps analysts to prioritise which documents to look at first
  • Find vital information from vast amount of unstructured text
  • Help border guards find people of interest without complex lists
  • Help find the unknowns for an investigator and analysts
  • Quickly find information on a device and provide data triage
  • Compare external data with internal data to find threats
  • Provide name matching on a laptop or small device
  • Ability to easily share multilingual documents across multiple departments
  • Help find content that are similar in different languages
  • Draw relationships between entities

Pricing

£25000 per licence per year

  • Education pricing available
  • Free trial available

Service documents

G-Cloud 10

761782523506981

Basis Technology Ltd

Chris Brown

0208 622 2900

cbrown@basistech.com

Service scope

Service scope
Software add-on or extension Yes, but can also be used as a standalone service
What software services is the service an extension to Search, case management solutions, BI, intel tools etc etc
Cloud deployment model Public cloud
Service constraints None that I am aware of
System requirements
  • A single server with 8 cpu's, 32GB memory
  • Can be run on mobile devices

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Typically within 8 hours
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support Yes, at an extra cost
Web chat support availability 9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard None or don’t know
How the web chat support is accessible Will provide upon request
Web chat accessibility testing None this would be a new service
Onsite support Yes, at extra cost
Support levels Basis shall address Bugs in accordance with the following protocols:
Critical Level: Bug has a critical business impact and loss of business or service, and no Workaround is available.
Basis promptly (1) designates Basis specialist(s) to correct Bug; (2) provides expanded communication on correction status; and (3) escalates troubleshooting a Workaround, Hot Fix or Fix;
Urgent Level: Software, or Software with Workaround, has a Bug which has significant business impact but does not cause loss of business or service.
Basis promptly (1) designates Basis specialist(s) to correct Bug; (2) provides ongoing communication on correction status; and (3) initiates troubleshooting a Workaround, Hot Fix or Fix;
Standard Level: Bug has minimal business impact or minor loss of service.
Basis (1) assigns Basis specialist(s) to commence correction of Bug; and (2) exercises all commercially reasonable efforts to include the Fix for Bug in the next Update;
Base Level: Bug has minor business impact or Customer suggests a product improvement or enhancement.
Basis (1) assigns Bug to case management and tracking; and (2) may include the Fix for Bug in the next Update.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started We will provide full documentation and email and telephone support but can also provide onsite support at extra costs
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction We provide a wind down process
End-of-contract process We provide a wind down process to allow a smooth transistion

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Firefox
  • Chrome
  • Safari 9+
Application to install Yes
Compatible operating systems
  • Linux or Unix
  • MacOS
  • Windows
Designed for use on mobile devices Yes
Differences between the mobile and desktop service For our name screening system it can be deployed on a laptop
Accessibility standards None or don’t know
Description of accessibility Will provide upon request
Accessibility testing Will provide upon request
API Yes
What users can and can't do using the API We provide restful API's
API documentation Yes
API documentation formats PDF
API sandbox or test environment No
Customisation available Yes
Description of customisation Can be tuned, customised and integrated to other applications

Scaling

Scaling
Independence of resources This service is usually deployed on premise so easy to manage

Analytics

Analytics
Service usage metrics No

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations No
Datacentre security standards Managed by a third party
Penetration testing frequency At least once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest Other
Other data at rest protection approach Will provide upon request
Data sanitisation process No
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach Json
Data export formats CSV
Data import formats
  • CSV
  • Other
Other data import formats Json

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks Private network or public sector network
Data protection within supplier network Other
Other protection within supplier network We normally use clients infrastructure

Availability and resilience

Availability and resilience
Guaranteed availability We will provide a SLA to our users
Approach to resilience Will provide upon request
Outage reporting Email alerts

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Username or password
Access restrictions in management interfaces and support channels Will provide upon request
Access restriction testing frequency At least once a year
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information No audit information available
Access to supplier activity audit information No audit information available
How long system logs are stored for Between 1 month and 6 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach Will provide upon request
Information security policies and processes Will provide upon request

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Will provide upon request
Vulnerability management type Supplier-defined controls
Vulnerability management approach Will provide upon request
Protective monitoring type Supplier-defined controls
Protective monitoring approach Will provide upon request
Incident management type Supplier-defined controls
Incident management approach Will provide upon request

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks Yes
Connected networks Public Services Network (PSN)

Pricing

Pricing
Price £25000 per licence per year
Discount for educational organisations Yes
Free trial available Yes
Description of free trial 30 days free evaluation with email and telephone support

Service documents

pdf document: Pricing document pdf document: Service definition document pdf document: Terms and conditions
Service documents
Return to top ↑