At AI Services we specialize in artificial intelligence and machine learning technologies. Our solutions include advance image and video analysis and recognition solutions. These can meet a range of business use cases which we work with customers to develop. e.g. CCTV image analysis and alerting of suspicious behaviour and individuals.
- Image Object, scene, and activity detection
- Image Facial recognition & analysis
- Unsafe content detection
- Text in image identification & analysis
- Video person tracking
- Real time analysis of video streams
- Bespoke model development and training and deployment
- Big data preparation, batch & kinesis streams processing
- Voice and text analysis and intelligence processing
- Edge computing with AI tuned hardware model deployment
- machine learning services and tools tailored to meet your needs
- services that provide computer vision, speech, language analysis, chatbot functionality.
- supports frameworks, including TensorFlow, Caffe2, Apache MXNet
- option of broad array of compute options for training, inference
- deep integration with tooling including data lake and database
- comprehensive set of services for data analysis including data warehousing
- Very strong storage encryption to keep your data secure
- Consume and pay for services as you need them
£450 to £1250 per person per day
- Education pricing available
- Free trial available
AI Cloud Services
07973 302 659
|Software add-on or extension||No|
|Cloud deployment model||
|Service constraints||Only the imagination|
|System requirements||None other than customer requirements|
|Email or online ticketing support||Email or online ticketing|
|Support response times||
4hrs for 9-5, Mon-Sun
P2 and above, 2 hrs 24x7
|User can manage status and priority of support tickets||Yes|
|Online ticketing support accessibility||WCAG 2.1 AAA|
|Phone support availability||9 to 5 (UK time), 7 days a week|
|Web chat support||Web chat|
|Web chat support availability||9 to 5 (UK time), 7 days a week|
|Web chat support accessibility standard||WCAG 2.1 AAA|
|Web chat accessibility testing||Assistive certification conducted by software vendors.|
|Onsite support||Onsite support|
All support costs are integrated into our blended costings, whether fixed costs or day rate. We are always happy to bespoke support arrangements to suit the customer.
Our systems are self healing and run with high 9s uptime.
Failure is designed into the solution architectures to self heal.
service support is available 24x7 when needed.
|Support available to third parties||Yes|
Onboarding and offboarding
|Getting started||We can provide customers with onsite training, online training, or user documentation. Normally, this is through a discovery and alpha phase to understand the AI technology and help develop use cases for business moments.|
|End-of-contract data extraction||
Customer data and privacy and security is paramount. Customers control and maintain access t their data from day one.
We work to ensure the correct assurance level is applied to the data and any compliance standards (PCI etc) are met.
Key management is controlled by the customer, so data access and removal is available at any time. We advise customers on storage options and formats to facilitate this.
As a cloud native company and service, customers only pay for what they consume. Customers have full control and transparency over this.
Data and code access is controlled by the customer where the solution is bespoke and can be closed down and removed at any time.
There are no contractual early exit penalties or extra costs to leave the service.
Using the service
|Web browser interface||Yes|
|Application to install||No|
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||None|
|Accessibility standards||WCAG 2.1 AAA|
|Accessibility testing||Certification provided by the software vendor.|
|What users can and can't do using the API||
Our solutions are fully interactive or programmatically available for integration to customer solutions.
A full suite of API exist, depending upon the solution, customer requirements, service management.
Typically, these allow full system management, monitoring, reporting and alerting.
|API documentation formats||
|API sandbox or test environment||Yes|
|Description of customisation||The open architecture, modular solutions can be designed to process a variety of use cases. this includes user interface, underlying functionality or monitoring and alerting functions.|
|Independence of resources||
Horizontal & vertical scaling and extensibility are designed into our solutions. Each customer's solution is isolated as a private tenancy with regards to isolation of security and performance.
Each customer has in effect, their own limitless availability of resources.
|Service usage metrics||Yes|
As a cloud native business, everything we do is monitored and measured. Service and resource consumption are key to this.
All chargeable consumables are closely monitored and the solutions are intelligent to tear down components when not in use (over night, after data loads etc). We fully utilize Infrastructure as Code, so everything can be provision at will and automated.
|Supplier type||Not a reseller|
|Staff security clearance||Conforms to BS7858:2012|
|Government security clearance||Up to Developed Vetting (DV)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||United Kingdom|
|User control over data storage and processing locations||Yes|
|Datacentre security standards||Complies with a recognised standard (for example CSA CCM version 3.0)|
|Penetration testing frequency||At least every 6 months|
|Penetration testing approach||‘IT Health Check’ performed by a CHECK service provider|
|Protecting data at rest||
|Data sanitisation process||Yes|
|Data sanitisation type||
|Equipment disposal approach||Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001|
Data importing and exporting
|Data export approach||A variety of solutions exist, from bulk physical device, APIs, bock data copy or storage exports. Network connectivity and data sensitivity are considered. We advise the customer during service design so these things are considered up front. Full deep data cleansing, including memory scrubbing takes place as routine when data moves storage. Customer data is never inadvertently available to other clients|
|Data export formats||
|Other data export formats||
|Data import formats||
|Other data import formats||
|Data protection between buyer and supplier networks||
|Data protection within supplier network||
Availability and resilience
|Guaranteed availability||All our AI solutions are designed for continual availability. 100% availability is very expensive, so we build in resilience to ensure an appropriate level, which is agreed with the customer and their required budgets. Design features include cross region and inter region resilience of components. Typically 99.9% is minimum, with 99.5% typical.|
|Approach to resilience||Available on request.|
We can provide all three alerting mechanisms:
- a public dashboard
- an API
- email alerts
Identity and authentication
|User authentication needed||Yes|
|Access restrictions in management interfaces and support channels||
All our systems are controlled by role based profiles. This strict RBAC ensures access to systems is only on a need basis. Starters / Leavers are strictly adhered to and admin roles are revoked after usage until the time they are needed and then re-allocated.
Using Infrastructure as Code, our CI/CD pipeline auto integrates, tests and deploys across environments. This means very little if any access, especially to live systems is required.
|Access restriction testing frequency||At least every 6 months|
|Management access authentication||
Audit information for users
|Access to user activity audit information||Users have access to real-time audit information|
|How long user audit data is stored for||User-defined|
|Access to supplier activity audit information||Users have access to real-time audit information|
|How long supplier audit data is stored for||At least 12 months|
|How long system logs are stored for||At least 12 months|
Standards and certifications
|ISO/IEC 27001 certification||Yes|
|Who accredited the ISO/IEC 27001||Available on request|
|ISO/IEC 27001 accreditation date||Available on request|
|What the ISO/IEC 27001 doesn’t cover||Available on request|
|ISO 28000:2007 certification||Yes|
|Who accredited the ISO 28000:2007||Available on request|
|ISO 28000:2007 accreditation date||Available on request|
|What the ISO 28000:2007 doesn’t cover||Available on request|
|CSA STAR certification||No|
|Who accredited the PCI DSS certification||Available on request|
|PCI DSS accreditation date||Available on request|
|What the PCI DSS doesn’t cover||Available on request|
|Other security certifications||No|
|Named board-level person responsible for service security||Yes|
|Security governance certified||Yes|
|Security governance standards||
|Information security policies and processes||Available on request.|
|Configuration and change management standard||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Configuration and change management approach||We can blend each of our project change management processes to meet our customer requirements. We have experience of ITIL based change control. Internally we apply continual deployment with multiple A/B Blue/green Deployments. Each deployment is delivered through Sprints which contribute to an Agile Release Train delivery. Present on the trains are all relevant stakeholders, where releases are evaluated and analysed, tested and bench marked for security, performance and functional impact analysis.|
|Vulnerability management type||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Vulnerability management approach||Available on request.|
|Protective monitoring type||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Protective monitoring approach||
Our PM processes are extensive in predicting, monitoring, alerting and responding to compromise. We deploy systems of continual healing and real time updates ,so we have latest patches always across the estate.
Depending upon the severity of the compromise, we react accordingly:
These responses increase in volume across the increasing severities.
|Incident management type||Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402|
|Incident management approach||
We have a comprehensive ITIL based incident management process.
Our service desk coordinates recording of all incidents.
Dashboards and weekly reports are also available.
|Approach to secure software development best practice||Conforms to a recognised standard, but self-assessed|
Public sector networks
|Connection to public sector networks||Yes|
|Price||£450 to £1250 per person per day|
|Discount for educational organisations||Yes|
|Free trial available||Yes|
|Description of free trial||Our free trials include production features. They are normally over limited time and often with synthetic data, as they normally constitute the start of a PoC or Discovery.|