Relative Insight

Relative Insight - Language Analysis & Comparative Text Analytics Platform

Relative Insight helps companies fuel sharper strategy and smarter communication by comparing and analysing language online (Social, Chatbots, forums, web copy) or offline (Qual transcripts, survey open ends etc.). To provide insight into the distinct ways you or audiences talk, to inform content, marketing and targeting.


  • Unlimited users
  • Unlimited words analysed
  • Dedicated Account Manager, comprehensive training and ongoing support
  • Analysis of both online and offline language data
  • Word, Topic, Phrase, Grammar and Emotional analysis
  • Customisable and shareable Dashboard
  • Highlights differences in language sets
  • Advanced comparative linguistics


  • Understand distinct differences in the ways audiences talk
  • Uncover differences in the way government, news & consumers talk
  • Uncover emerging trends and how these change over time
  • Proprietary Emotional, topic, grammar and key word analysis
  • Create tailored content, targeted at different audience segments
  • Advanced language analysis on top of social listening data
  • Advanced language analysis of Qual and Quant data


£15000 per licence per year

  • Education pricing available
  • Free trial available

Service documents


G-Cloud 11

Service ID

9 2 4 7 9 0 9 3 1 1 7 3 0 2 0


Relative Insight

Rachel Banks

020 3794 5476

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Private cloud
Service constraints Cannot compare data sets in different languages. e.g. we cannot compare English to French. But can compare English vs English data sets.
System requirements Use of a modern internet browser

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Within 2 business hours - most calls are fixed within 45 minutes
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Onsite support
Support levels Dedicated Account Manager based in London, who will provide unlimited training and support both in person and via email & phone. Access to our technical analyst team, to advise you on complex projects. All provided at no extra cost and as part of the subscription service.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Relative will always propose a bespoke onboarding service based a specific client's needs. We follow a customer success methodology when onboarding a client, with each element of the process aligned to deliver maximum value. Elements include training, professional services setup and account management.
Service documentation No
End-of-contract data extraction Relative insight is not a data provider. Data is imported to the platform for analysis by the client and therefore will exist on internal systems prior to Relative
End-of-contract process 30-day notice period. We ask our clients to submit notification in writing to their Account Manager. As soon as the notice period has expired, your account will be deactivated and can no longer be accessed.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service The capabilities are the same, however the smaller screen space will mean the user will have to navigate around the screen more
Service interface No
What users can and can't do using the API There is an API for the service that allows the users to do what they would do via the browser but programmatically.

The API is not normally offered by default and is provided on a case by case basis. As part of this it can be customised for clients where feasible
API documentation Yes
API documentation formats Other
API sandbox or test environment Yes
Customisation available No


Independence of resources Our analysis platform runs on a scalable platform.
Should more analysis capability be required or more storage needed, then new cloud instances can be seamlessly launched.


Service usage metrics No


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Staff screening not performed
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least every 6 months
Penetration testing approach Another external penetration testing organisation
Protecting data at rest Other
Other data at rest protection approach Data is stored on Amazon cloud instances, with physical access controlled by them
Data is not encrypted, but digital access controls are in place to ensure that only clients can access their data, along with key people within the company when necessary (account managers, technical heads)
Data sanitisation process No
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach Users are able to export the analysis as a CSV file via the web based dashboard
Data export formats CSV
Data import formats
  • CSV
  • Other
Other data import formats Text files

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability Our service has an availability guarantee of 99%, and in the lifetime of the company this has never been breached.

Should it ever be the case that our availability drops below this level, then clients will receive credits that can be used to provide extra analysis time or projects for use within our system
Approach to resilience We have a 3 tier architecture - frontend, backend, data. Each operates on their own instance, meaning that replacement instances can be quickly and seamlessly started up should a problem develop.
All our cloud instances are backed up daily.
Outage reporting Email alerts and calling clients where possible

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Username or password
Access restrictions in management interfaces and support channels Account managers assigned to the client have access to client data, no other support or account managers do

Only the CTO and COO have access to client data via database access - no other members of the company do
Access restriction testing frequency At least every 6 months
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 ISOQAR
ISO/IEC 27001 accreditation date 11/7/2018
What the ISO/IEC 27001 doesn’t cover All aspects of the companies operation are covered by the certification
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes As part of our ISO 27001 Information Security Management System, we have a number of security policies in place that we follow.

1. Information Security Policy (A5.1.1)
2. Mobile Devices and Teleworking Policy (A6.2.1)
3. Acceptable Use of Assets Policy (A8.1.3)
4. Information Classification Policy (A8.2.1)
5. Disposal and Destruction Policy (A8.3.2)
6. Access Control Policy (A9.1.1)
7. Password Policy (A9.3.1)
8. Use of Cryptographic Controls Policy (A10.1.1)
9. Clear Desk and Screen Policy (A11.2.9)
10. Backup Policy (A12.3.1)
11. Information Transfer Policy (A13.2.1)
12. Social Media Policy (A13.2.3)
13. Policy for Supplier Relationships (A15.1.1)

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Each change request is recorded on a change management system. Each change is then reviewed, including any potential security impact which is noted, a scheduling decision is made by the CTO as to when the change should be made. Each source code modification to enact the change is logged and attached to the original change request. Any unit tests associated to the change are also recorded. Before deployment all changes are reviewed to ensure unit tests are passed and the change meets the original requirements.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Information from potential threats is received via email alerts from the UK's National Cyber Security Central and the US's National Cyber Awareness System. The seriousness of threat determines our response, with serious threats being patched within an hour of discovery.
Protective monitoring type Supplier-defined controls
Protective monitoring approach All server instances are monitored for unauthorised access and other unusual activity by monitoring traffic patterns. Weekly penetration testing is also conducted by a 3rd party to discover any potential weaknesses. Upon discovery, the potential compromise is investigated, lead by the CTO, to determine whether a compromise has actually occurred. If a compromise has occurred our incident management process is initiated. Otherwise, the threat is assessed and prioritised with patches applied within an hour for the most serious of threats.
Incident management type Supplier-defined controls
Incident management approach Relative Insight has a defined incident management policy, that all employees are required to adhere to.
Any incidents are captured within a Security Incident Form that is passed to the IS officer for review.
The IS officer will then determine the appropriate course of action.
Clients are able to report incidents to their account manager, who will then complete a Security Incident Form.
Should a security incident impact on a client, they will immediately be informed by email and phone.

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Public sector networks
Connection to public sector networks No


Price £15000 per licence per year
Discount for educational organisations Yes
Free trial available Yes
Description of free trial Week long access to the Demo platform. Logins provided, to explore the platform and pre-existing case studies.

Service documents

Return to top ↑