AI Cloud Services

A AI Artificial Intelligence & Machine Learning Cloud software solutions

At AI Services we specialize in artificial intelligence and machine learning technologies. Our solutions include advance image and video analysis and recognition solutions. These can meet a range of business use cases which we work with customers to develop. e.g. CCTV image analysis and alerting of suspicious behaviour and individuals.

Features

  • Image Object, scene, and activity detection
  • Image Facial recognition & analysis
  • Unsafe content detection
  • Text in image identification & analysis
  • Video person tracking
  • Real time analysis of video streams
  • Bespoke model development and training and deployment
  • Big data preparation, batch & kinesis streams processing
  • Voice and text analysis and intelligence processing
  • Edge computing with AI tuned hardware model deployment

Benefits

  • machine learning services and tools tailored to meet your needs
  • services that provide computer vision, speech, language analysis, chatbot functionality.
  • supports frameworks, including TensorFlow, Caffe2, Apache MXNet
  • option of broad array of compute options for training, inference
  • deep integration with tooling including data lake and database
  • comprehensive set of services for data analysis including data warehousing
  • Very strong storage encryption to keep your data secure
  • Consume and pay for services as you need them

Pricing

£450 to £1250 per person per day

  • Education pricing available
  • Free trial available

Service documents

G-Cloud 11

960745892509096

AI Cloud Services

AI Services

07973 302 659

sales@ai-services.cloud

Service scope

Service scope
Software add-on or extension No
Cloud deployment model
  • Public cloud
  • Hybrid cloud
Service constraints Only the imagination
System requirements None other than customer requirements

User support

User support
Email or online ticketing support Email or online ticketing
Support response times 4hrs for 9-5, Mon-Sun
P2 and above, 2 hrs 24x7
User can manage status and priority of support tickets Yes
Online ticketing support accessibility WCAG 2.1 AAA
Phone support Yes
Phone support availability 9 to 5 (UK time), 7 days a week
Web chat support Web chat
Web chat support availability 9 to 5 (UK time), 7 days a week
Web chat support accessibility standard WCAG 2.1 AAA
Web chat accessibility testing Assistive certification conducted by software vendors.
Onsite support Onsite support
Support levels All support costs are integrated into our blended costings, whether fixed costs or day rate. We are always happy to bespoke support arrangements to suit the customer.
Our systems are self healing and run with high 9s uptime.
Failure is designed into the solution architectures to self heal.
service support is available 24x7 when needed.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started We can provide customers with onsite training, online training, or user documentation. Normally, this is through a discovery and alpha phase to understand the AI technology and help develop use cases for business moments.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction Customer data and privacy and security is paramount. Customers control and maintain access t their data from day one.
We work to ensure the correct assurance level is applied to the data and any compliance standards (PCI etc) are met.
Key management is controlled by the customer, so data access and removal is available at any time. We advise customers on storage options and formats to facilitate this.
End-of-contract process As a cloud native company and service, customers only pay for what they consume. Customers have full control and transparency over this.
Data and code access is controlled by the customer where the solution is bespoke and can be closed down and removed at any time.
There are no contractual early exit penalties or extra costs to leave the service.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service None
Accessibility standards WCAG 2.1 AAA
Accessibility testing Certification provided by the software vendor.
API Yes
What users can and can't do using the API Our solutions are fully interactive or programmatically available for integration to customer solutions.
A full suite of API exist, depending upon the solution, customer requirements, service management.
Typically, these allow full system management, monitoring, reporting and alerting.
API documentation Yes
API documentation formats
  • HTML
  • PDF
API sandbox or test environment Yes
Customisation available Yes
Description of customisation The open architecture, modular solutions can be designed to process a variety of use cases. this includes user interface, underlying functionality or monitoring and alerting functions.

Scaling

Scaling
Independence of resources Horizontal & vertical scaling and extensibility are designed into our solutions. Each customer's solution is isolated as a private tenancy with regards to isolation of security and performance.
Each customer has in effect, their own limitless availability of resources.

Analytics

Analytics
Service usage metrics Yes
Metrics types As a cloud native business, everything we do is monitored and measured. Service and resource consumption are key to this.
All chargeable consumables are closely monitored and the solutions are intelligent to tear down components when not in use (over night, after data loads etc). We fully utilize Infrastructure as Code, so everything can be provision at will and automated.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least every 6 months
Penetration testing approach ‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach A variety of solutions exist, from bulk physical device, APIs, bock data copy or storage exports. Network connectivity and data sensitivity are considered. We advise the customer during service design so these things are considered up front. Full deep data cleansing, including memory scrubbing takes place as routine when data moves storage. Customer data is never inadvertently available to other clients
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats
  • Block data
  • RDBMS exports
  • Any format required
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats
  • Block storage
  • RDBMS inports
  • Most common formats

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Bonded fibre optic connections
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability All our AI solutions are designed for continual availability. 100% availability is very expensive, so we build in resilience to ensure an appropriate level, which is agreed with the customer and their required budgets. Design features include cross region and inter region resilience of components. Typically 99.9% is minimum, with 99.5% typical.
Approach to resilience Available on request.
Outage reporting We can provide all three alerting mechanisms:
- a public dashboard
- an API
- email alerts

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
Access restrictions in management interfaces and support channels All our systems are controlled by role based profiles. This strict RBAC ensures access to systems is only on a need basis. Starters / Leavers are strictly adhered to and admin roles are revoked after usage until the time they are needed and then re-allocated.
Using Infrastructure as Code, our CI/CD pipeline auto integrates, tests and deploys across environments. This means very little if any access, especially to live systems is required.
Access restriction testing frequency At least every 6 months
Management access authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 Available on request
ISO/IEC 27001 accreditation date Available on request
What the ISO/IEC 27001 doesn’t cover Available on request
ISO 28000:2007 certification Yes
Who accredited the ISO 28000:2007 Available on request
ISO 28000:2007 accreditation date Available on request
What the ISO 28000:2007 doesn’t cover Available on request
CSA STAR certification No
PCI certification Yes
Who accredited the PCI DSS certification Available on request
PCI DSS accreditation date Available on request
What the PCI DSS doesn’t cover Available on request
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards
  • CSA CCM version 3.0
  • ISO/IEC 27001
Information security policies and processes Available on request.

Operational security

Operational security
Configuration and change management standard Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach We can blend each of our project change management processes to meet our customer requirements. We have experience of ITIL based change control. Internally we apply continual deployment with multiple A/B Blue/green Deployments. Each deployment is delivered through Sprints which contribute to an Agile Release Train delivery. Present on the trains are all relevant stakeholders, where releases are evaluated and analysed, tested and bench marked for security, performance and functional impact analysis.
Vulnerability management type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach Available on request.
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach Our PM processes are extensive in predicting, monitoring, alerting and responding to compromise. We deploy systems of continual healing and real time updates ,so we have latest patches always across the estate.
Depending upon the severity of the compromise, we react accordingly:
P1<1hrs
P2<4hrs
P3<8hrs

These responses increase in volume across the increasing severities.
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach We have a comprehensive ITIL based incident management process.
Our service desk coordinates recording of all incidents.
Dashboards and weekly reports are also available.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks Yes
Connected networks
  • Public Services Network (PSN)
  • Joint Academic Network (JANET)

Pricing

Pricing
Price £450 to £1250 per person per day
Discount for educational organisations Yes
Free trial available Yes
Description of free trial Our free trials include production features. They are normally over limited time and often with synthetic data, as they normally constitute the start of a PoC or Discovery.

Service documents

pdf document: Pricing document pdf document: Skills Framework for the Information Age rate card pdf document: Terms and conditions
Service documents
Return to top ↑