Tricostar Software Ltd

Data Discovery, Classification and Remediation from MinerEye

Our complete data discovery tool autonomously and intelligently uncovers the otherwise undiscovered, wherever it resides. It helps to enforce GDPR and security policies, identifies potential insider threats, alerts you to vulnerabilities, and manages and reclassifies your data – no matter where it resides.


  • Monitors endpoints, repositories, databases and cloud services
  • Advanced comprehensive algorithms extract content to categorize data
  • In built search provides content aware information
  • In built search provides a real time risk overview
  • Instant alerts to security or compliance violations
  • All common file formats are supported
  • All common databases are supported
  • All common cloud services are supported
  • Integrates with many SIEM, DLP classification tools


  • Profiles and matches data patterns using only bytes of file
  • Auto Classify and track all unstructured sensitive data anywhere
  • Detect outlier and abnormal data behavior
  • Ability to scan large amounts of data
  • Lower OPEX by leveraging machine learning to eliminate rules
  • Limit personal data collection storage and usage to relevant data
  • Reports on sharing violation without compromising personal information
  • Trigger Data Protection system with similar data locations report
  • Simplifies Data Subject Access Requests
  • Interpretative AI identifies non classified documents and applies classification


£10,000 a unit a year

  • Education pricing available

Service documents


G-Cloud 12

Service ID

7 7 4 8 3 6 4 8 0 9 2 4 4 8 7


Tricostar Software Ltd James Lawler
Telephone: 0333 220 5081

Service scope

Software add-on or extension
Cloud deployment model
  • Public cloud
  • Private cloud
Service constraints
There are no known use constraints
System requirements
  • MinerEye is shipped and deployed as distributed micro services
  • Requires a dedicated virtual machine and MinerEye licences

User support

Email or online ticketing support
Email or online ticketing
Support response times
Normally within 8 hours
User can manage status and priority of support tickets
Online ticketing support accessibility
None or don’t know
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Onsite support
Yes, at extra cost
Support levels
Support Availability: 365/24/7 Standard support response times: • Response time for severity 1 (critical) issue: 1 hour • Response time for Severity 2 (high) issue: 2 hours • Response time for severity 3 (medium) issue: 1 business day • Response time for severity 4 (normal) issue: 2 business days
Support available to third parties

Onboarding and offboarding

Getting started
Onsite and Remote Training available, as well as all applicable documentation.

Implementation is simple (and takes man hours as opposed to man days/weeks) and all can be done remotely.
Service documentation
Documentation formats
End-of-contract data extraction
Data and scan results can be downloaded
End-of-contract process
Contract is based on annual subscription that can be extended.

Using the service

Web browser interface
Supported browsers
Application to install
Compatible operating systems
  • Android
  • IOS
  • MacOS
  • Windows
Designed for use on mobile devices
Service interface
Description of service interface
MinerEye provides a service interface that works with all the standard major browsers providing both textual and graphical information.
Accessibility standards
None or don’t know
Description of accessibility
Accessibility is largely defied by accessibility tools specific to the browser used
Accessibility testing
What users can and can't do using the API
APIs to Threat Intelligence Systems, Orchestration Systems and Policy Enforcement Systems
API documentation
API documentation formats
Open API (also known as Swagger)
API sandbox or test environment
Customisation available
Description of customisation
Users can configure search to reflect their unique geographical security and standards protocols


Independence of resources
It is provided on a dedicated client virtual server


Service usage metrics
Metrics types
Through user interface
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type
Reseller providing extra support
Organisation whose services are being resold

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Encryption of all physical media
  • Other
Other data at rest protection approach
It is based on the customer protection policy
Data sanitisation process
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
CSV files
Data export formats
Data import formats
Other data import formats
Document samples (any text-based document)

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • Other
Other protection between networks
MinerEye is deployed on the customer network
Data protection within supplier network
Other protection within supplier network
N/a as MinerEye is deployed on the customer network.

Availability and resilience

Guaranteed availability
Azure guarantee that Apps running in a customer subscription will be available 99.95% of the time Service Credit Monthly Uptime Percentage Service Credit < 99.95% is 10%: < 99% is 25% For full SLA see:
Approach to resilience
Regional pairs are enabled by default in Windows Azure Storage, helping to ensue that applications are resilient during data centre failures. In regional pairing, Azure asynchronously replicates data from a primary location to a secondary location within the same region. An Azure region is an area within a geography containing one or more data centres.
Outage reporting
We receive information from Azure via our Dashboard and pass information to our clients via email alerts

Identity and authentication

User authentication needed
User authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password
Access restrictions in management interfaces and support channels
Group Policy for managing users and computers • Does not have Organizational Units. It is a flat organizational structure • There are no forests or trusts. Federation is used to allow outside of boundary authentication and authorization
Access restriction testing frequency
At least every 6 months
Management access authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
Between 1 month and 6 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
Between 1 month and 6 months
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
ISO/IEC 27001 accreditation date
24/04/2019 and accredited annually
What the ISO/IEC 27001 doesn’t cover
ISO 28000:2007 certification
CSA STAR certification
CSA STAR accreditation date
CSA STAR certification level
Level 3: CSA STAR Certification
What the CSA STAR doesn’t cover
Any system not hosted on Microsoft Azure.
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
Scheduled reviews of security controls and reporting within the team and to management of results. Security Director ensures all policies are followed and regular training given to team members

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
All software is version controlled within a repository for distributed version control and source code management. Test cycles include System, Unit, Integration and OWASP check list
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Number of methods are used to monitor and assess threats: 1. Alert notifications are sent by Azure to our support team where irregular activity has been detected e.g. unusual IP address - 2. Unusual activity is immediately investigated and verified as a threat or a known location and blocked or permitted 3. Security patches are automatically applied by Azure 4. Azure provides information regarding unknown IP addresses 5. Failed access attempts are tracked by the software and alerted to the support team where an unusual number of attempts are detected
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
A number of methods are used to monitor and assess threats: 1. Audit trail of IP addresses that have accessed the service are tracked and checked weekly by our support team unless Azure has sent an interim alert 2. User activity is tracked by the system in both database per user events and also in audit logs - checked weekly 3. Unusual activity is immediately investigated and verified as a threat or a known location and blocked or permitted 4. Immediate response on detection of issue
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Incident management is by the following workflow: 1. Detection and recording 2. Classification, initial support and communication to management & client 3. Investigation and initial diagnosis and communication to management & client 4. Resolution and Recovery and communication to management & client 5. Escalation if not resolved and communication to management & client 6. 7. Closure once incident has been deemed to have been resolved and communication to management & client

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks


£10,000 a unit a year
Discount for educational organisations
Free trial available

Service documents