AI Cloud Services

A AI Artificial Intelligence & Machine Learning Cloud software solutions

At AI Services we specialize in artificial intelligence and machine learning technologies. Our solutions include advance image and video analysis and recognition solutions. These can meet a range of business use cases which we work with customers to develop. e.g. CCTV image analysis and alerting of suspicious behaviour and individuals.

Features

  • Image Object, scene, and activity detection
  • Image Facial recognition & analysis
  • Unsafe content detection
  • Text in image identification & analysis
  • Video person tracking
  • Real time analysis of video streams
  • Bespoke model development and training and deployment
  • Big data preparation, batch & kinesis streams processing
  • Voice and text analysis and intelligence processing
  • Edge computing with AI tuned hardware model deployment

Benefits

  • machine learning services and tools tailored to meet your needs
  • services that provide computer vision, speech, language analysis, chatbot functionality.
  • supports frameworks, including TensorFlow, Caffe2, Apache MXNet
  • option of broad array of compute options for training, inference
  • deep integration with tooling including data lake and database
  • comprehensive set of services for data analysis including data warehousing
  • Very strong storage encryption to keep your data secure
  • Consume and pay for services as you need them

Pricing

£450 to £1250 per person per day

  • Education pricing available
  • Free trial available

Service documents

Framework

G-Cloud 11

Service ID

9 6 0 7 4 5 8 9 2 5 0 9 0 9 6

Contact

AI Cloud Services

AI Services

07973 302 659

sales@ai-services.cloud

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Hybrid cloud
Service constraints
Only the imagination
System requirements
None other than customer requirements

User support

Email or online ticketing support
Email or online ticketing
Support response times
4hrs for 9-5, Mon-Sun
P2 and above, 2 hrs 24x7
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AAA
Phone support
Yes
Phone support availability
9 to 5 (UK time), 7 days a week
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), 7 days a week
Web chat support accessibility standard
WCAG 2.1 AAA
Web chat accessibility testing
Assistive certification conducted by software vendors.
Onsite support
Onsite support
Support levels
All support costs are integrated into our blended costings, whether fixed costs or day rate. We are always happy to bespoke support arrangements to suit the customer.
Our systems are self healing and run with high 9s uptime.
Failure is designed into the solution architectures to self heal.
service support is available 24x7 when needed.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We can provide customers with onsite training, online training, or user documentation. Normally, this is through a discovery and alpha phase to understand the AI technology and help develop use cases for business moments.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Customer data and privacy and security is paramount. Customers control and maintain access t their data from day one.
We work to ensure the correct assurance level is applied to the data and any compliance standards (PCI etc) are met.
Key management is controlled by the customer, so data access and removal is available at any time. We advise customers on storage options and formats to facilitate this.
End-of-contract process
As a cloud native company and service, customers only pay for what they consume. Customers have full control and transparency over this.
Data and code access is controlled by the customer where the solution is bespoke and can be closed down and removed at any time.
There are no contractual early exit penalties or extra costs to leave the service.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
None
Service interface
Yes
Description of service interface
Various depending upon requirements and solution.
options include Web Interface, Command Line interface and developer APIs.
Accessibility standards
WCAG 2.1 AAA
Accessibility testing
Certification provided by the software vendor.
API
Yes
What users can and can't do using the API
Our solutions are fully interactive or programmatically available for integration to customer solutions.
A full suite of API exist, depending upon the solution, customer requirements, service management.
Typically, these allow full system management, monitoring, reporting and alerting.
API documentation
Yes
API documentation formats
  • HTML
  • PDF
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
The open architecture, modular solutions can be designed to process a variety of use cases. this includes user interface, underlying functionality or monitoring and alerting functions.

Scaling

Independence of resources
Horizontal & vertical scaling and extensibility are designed into our solutions. Each customer's solution is isolated as a private tenancy with regards to isolation of security and performance.
Each customer has in effect, their own limitless availability of resources.

Analytics

Service usage metrics
Yes
Metrics types
As a cloud native business, everything we do is monitored and measured. Service and resource consumption are key to this.
All chargeable consumables are closely monitored and the solutions are intelligent to tear down components when not in use (over night, after data loads etc). We fully utilize Infrastructure as Code, so everything can be provision at will and automated.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
A variety of solutions exist, from bulk physical device, APIs, bock data copy or storage exports. Network connectivity and data sensitivity are considered. We advise the customer during service design so these things are considered up front. Full deep data cleansing, including memory scrubbing takes place as routine when data moves storage. Customer data is never inadvertently available to other clients
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats
  • Block data
  • RDBMS exports
  • Any format required
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats
  • Block storage
  • RDBMS inports
  • Most common formats

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Bonded fibre optic connections
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
All our AI solutions are designed for continual availability. 100% availability is very expensive, so we build in resilience to ensure an appropriate level, which is agreed with the customer and their required budgets. Design features include cross region and inter region resilience of components. Typically 99.9% is minimum, with 99.5% typical.
Approach to resilience
Available on request.
Outage reporting
We can provide all three alerting mechanisms:
- a public dashboard
- an API
- email alerts

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
Access restrictions in management interfaces and support channels
All our systems are controlled by role based profiles. This strict RBAC ensures access to systems is only on a need basis. Starters / Leavers are strictly adhered to and admin roles are revoked after usage until the time they are needed and then re-allocated.
Using Infrastructure as Code, our CI/CD pipeline auto integrates, tests and deploys across environments. This means very little if any access, especially to live systems is required.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
Available on request
ISO/IEC 27001 accreditation date
Available on request
What the ISO/IEC 27001 doesn’t cover
Available on request
ISO 28000:2007 certification
Yes
Who accredited the ISO 28000:2007
Available on request
ISO 28000:2007 accreditation date
Available on request
What the ISO 28000:2007 doesn’t cover
Available on request
CSA STAR certification
No
PCI certification
Yes
Who accredited the PCI DSS certification
Available on request
PCI DSS accreditation date
Available on request
What the PCI DSS doesn’t cover
Available on request
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
  • CSA CCM version 3.0
  • ISO/IEC 27001
Information security policies and processes
Available on request.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
We can blend each of our project change management processes to meet our customer requirements. We have experience of ITIL based change control. Internally we apply continual deployment with multiple A/B Blue/green Deployments. Each deployment is delivered through Sprints which contribute to an Agile Release Train delivery. Present on the trains are all relevant stakeholders, where releases are evaluated and analysed, tested and bench marked for security, performance and functional impact analysis.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Available on request.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Our PM processes are extensive in predicting, monitoring, alerting and responding to compromise. We deploy systems of continual healing and real time updates ,so we have latest patches always across the estate.
Depending upon the severity of the compromise, we react accordingly:
P1<1hrs
P2<4hrs
P3<8hrs

These responses increase in volume across the increasing severities.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
We have a comprehensive ITIL based incident management process.
Our service desk coordinates recording of all incidents.
Dashboards and weekly reports are also available.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
Yes
Connected networks
  • Public Services Network (PSN)
  • Joint Academic Network (JANET)

Pricing

Price
£450 to £1250 per person per day
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Our free trials include production features. They are normally over limited time and often with synthetic data, as they normally constitute the start of a PoC or Discovery.

Service documents

Return to top ↑