AI Cloud Services

A AI Artificial Intelligence & Machine Learning Cloud software solutions

At AI Services we specialize in artificial intelligence and machine learning technologies. Our solutions include advance image and video analysis and recognition solutions. These can meet a range of business use cases which we work with customers to develop. e.g. CCTV image analysis and alerting of suspicious behaviour and individuals.


  • Image Object, scene, and activity detection
  • Image Facial recognition & analysis
  • Unsafe content detection
  • Text in image identification & analysis
  • Video person tracking
  • Real time analysis of video streams
  • Bespoke model development and training and deployment
  • Big data preparation, batch & kinesis streams processing
  • Voice and text analysis and intelligence processing
  • Edge computing with AI tuned hardware model deployment


  • machine learning services and tools tailored to meet your needs
  • services that provide computer vision, speech, language analysis, chatbot functionality.
  • supports frameworks, including TensorFlow, Caffe2, Apache MXNet
  • option of broad array of compute options for training, inference
  • deep integration with tooling including data lake and database
  • comprehensive set of services for data analysis including data warehousing
  • Very strong storage encryption to keep your data secure
  • Consume and pay for services as you need them


£450 to £1250 per person per day

  • Education pricing available
  • Free trial available

Service documents


G-Cloud 11

Service ID

9 6 0 7 4 5 8 9 2 5 0 9 0 9 6


AI Cloud Services

AI Services

07973 302 659

Service scope

Software add-on or extension
Cloud deployment model
  • Public cloud
  • Hybrid cloud
Service constraints
Only the imagination
System requirements
None other than customer requirements

User support

Email or online ticketing support
Email or online ticketing
Support response times
4hrs for 9-5, Mon-Sun
P2 and above, 2 hrs 24x7
User can manage status and priority of support tickets
Online ticketing support accessibility
Phone support
Phone support availability
9 to 5 (UK time), 7 days a week
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), 7 days a week
Web chat support accessibility standard
Web chat accessibility testing
Assistive certification conducted by software vendors.
Onsite support
Onsite support
Support levels
All support costs are integrated into our blended costings, whether fixed costs or day rate. We are always happy to bespoke support arrangements to suit the customer.
Our systems are self healing and run with high 9s uptime.
Failure is designed into the solution architectures to self heal.
service support is available 24x7 when needed.
Support available to third parties

Onboarding and offboarding

Getting started
We can provide customers with onsite training, online training, or user documentation. Normally, this is through a discovery and alpha phase to understand the AI technology and help develop use cases for business moments.
Service documentation
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Customer data and privacy and security is paramount. Customers control and maintain access t their data from day one.
We work to ensure the correct assurance level is applied to the data and any compliance standards (PCI etc) are met.
Key management is controlled by the customer, so data access and removal is available at any time. We advise customers on storage options and formats to facilitate this.
End-of-contract process
As a cloud native company and service, customers only pay for what they consume. Customers have full control and transparency over this.
Data and code access is controlled by the customer where the solution is bespoke and can be closed down and removed at any time.
There are no contractual early exit penalties or extra costs to leave the service.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
Service interface
Description of service interface
Various depending upon requirements and solution.
options include Web Interface, Command Line interface and developer APIs.
Accessibility standards
Accessibility testing
Certification provided by the software vendor.
What users can and can't do using the API
Our solutions are fully interactive or programmatically available for integration to customer solutions.
A full suite of API exist, depending upon the solution, customer requirements, service management.
Typically, these allow full system management, monitoring, reporting and alerting.
API documentation
API documentation formats
  • HTML
  • PDF
API sandbox or test environment
Customisation available
Description of customisation
The open architecture, modular solutions can be designed to process a variety of use cases. this includes user interface, underlying functionality or monitoring and alerting functions.


Independence of resources
Horizontal & vertical scaling and extensibility are designed into our solutions. Each customer's solution is isolated as a private tenancy with regards to isolation of security and performance.
Each customer has in effect, their own limitless availability of resources.


Service usage metrics
Metrics types
As a cloud native business, everything we do is monitored and measured. Service and resource consumption are key to this.
All chargeable consumables are closely monitored and the solutions are intelligent to tear down components when not in use (over night, after data loads etc). We fully utilize Infrastructure as Code, so everything can be provision at will and automated.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports


Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
A variety of solutions exist, from bulk physical device, APIs, bock data copy or storage exports. Network connectivity and data sensitivity are considered. We advise the customer during service design so these things are considered up front. Full deep data cleansing, including memory scrubbing takes place as routine when data moves storage. Customer data is never inadvertently available to other clients
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats
  • Block data
  • RDBMS exports
  • Any format required
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats
  • Block storage
  • RDBMS inports
  • Most common formats

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Bonded fibre optic connections
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
All our AI solutions are designed for continual availability. 100% availability is very expensive, so we build in resilience to ensure an appropriate level, which is agreed with the customer and their required budgets. Design features include cross region and inter region resilience of components. Typically 99.9% is minimum, with 99.5% typical.
Approach to resilience
Available on request.
Outage reporting
We can provide all three alerting mechanisms:
- a public dashboard
- an API
- email alerts

Identity and authentication

User authentication needed
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
Access restrictions in management interfaces and support channels
All our systems are controlled by role based profiles. This strict RBAC ensures access to systems is only on a need basis. Starters / Leavers are strictly adhered to and admin roles are revoked after usage until the time they are needed and then re-allocated.
Using Infrastructure as Code, our CI/CD pipeline auto integrates, tests and deploys across environments. This means very little if any access, especially to live systems is required.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
Available on request
ISO/IEC 27001 accreditation date
Available on request
What the ISO/IEC 27001 doesn’t cover
Available on request
ISO 28000:2007 certification
Who accredited the ISO 28000:2007
Available on request
ISO 28000:2007 accreditation date
Available on request
What the ISO 28000:2007 doesn’t cover
Available on request
CSA STAR certification
PCI certification
Who accredited the PCI DSS certification
Available on request
PCI DSS accreditation date
Available on request
What the PCI DSS doesn’t cover
Available on request
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
  • CSA CCM version 3.0
  • ISO/IEC 27001
Information security policies and processes
Available on request.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
We can blend each of our project change management processes to meet our customer requirements. We have experience of ITIL based change control. Internally we apply continual deployment with multiple A/B Blue/green Deployments. Each deployment is delivered through Sprints which contribute to an Agile Release Train delivery. Present on the trains are all relevant stakeholders, where releases are evaluated and analysed, tested and bench marked for security, performance and functional impact analysis.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Available on request.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Our PM processes are extensive in predicting, monitoring, alerting and responding to compromise. We deploy systems of continual healing and real time updates ,so we have latest patches always across the estate.
Depending upon the severity of the compromise, we react accordingly:

These responses increase in volume across the increasing severities.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
We have a comprehensive ITIL based incident management process.
Our service desk coordinates recording of all incidents.
Dashboards and weekly reports are also available.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
Connected networks
  • Public Services Network (PSN)
  • Joint Academic Network (JANET)


£450 to £1250 per person per day
Discount for educational organisations
Free trial available
Description of free trial
Our free trials include production features. They are normally over limited time and often with synthetic data, as they normally constitute the start of a PoC or Discovery.

Service documents

Return to top ↑