Tetra Connect
Tetra Connect offers a streamlined solution for the intricate process of identity resolution and person matching, delivering precise outcomes customised to meet your specific requirements.
Our platform simplifies identity resolution, ensuring seamless and dependable operations for your business. By harnessing enriched data insights, we empower you to make informed decisions.
Features
- Real-time identity search: Achieve instantaneous and precise results.
- Advanced data matching: Easily manage name variations and aliases.
- Fuzzy matching: Utilise phonetic queries for thorough outcomes.
- Customisable scoring: Personalise result sets based on specific metrics.
- Efficient data management: Index and synchronise big data seamlessly.
- Seamless integration: Effortlessly connect with multiple database providers.
- Cloud-native architecture: Deploy flexibly on-premises or as a managed service.
- Containerised: Docker image deployment pattern
- Java Based: Secure, mature and performant
Benefits
- Mitigates risk of fraudulent identities, safeguarding organisational integrity.
- Provides a scalable, maintainable solution for long-term organisational growth.
- Ensures data security and confidentiality, safeguarding sensitive information.
- Facilitates seamless integration with existing systems through a REST API.
- Improves user experience with an intuitive and interactive interface.
- White-box components are explainable and transparent, enhancing understanding.
- Configuration management through the user interface simplifies operations.
- Continuous deployment supported allowing value to be quickly realised.
Pricing
£195,000 a licence a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
2 3 8 0 8 2 5 5 0 8 1 9 1 1 0
Contact
TETRA TECHNOLOGY LTD
Sales Team
Telephone: +44 7494 116629
Email: sales@tetratechnology.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
- There are no known constraints
- System requirements
-
- Unix
- Docker
- Network Connectivity
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Monday to Friday - 9am - 5.00pm (excluding Public Holidays).
Error Severity Level 1 (Critical): Response Time = 2 hours
Error Severity Level 2 (Serious): Response Time = 4 hours
Error Severity Level 3 (Degraded): Response Time = 8 hours
Error Severity Level 4 (Minimal): Response Time = 48 hours - User can manage status and priority of support tickets
- No
- Phone support
- No
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Support services are agreed with clients on a case by case basis, dependent on requirements.
A technical account manager and/or cloud support engineer can be provided at an additional cost based on the agile rate card. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We provide complete service and user documentation and online or onsite training as required.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
-
We do not store the users proprietary data.
On completion of contract the users usage data (for example logs, service tickets, caching, indexes etc.) can be provided on request and will be wiped from our system. - End-of-contract process
- As the service only consumes only the customers data and provides relevant results. All data is owned by the customer and would be provided at the end of the contract. Any data loading support to a third party system would require discussion with the technical team and may incur a charge.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- Description of service interface
- There is a Tetra Connect user interface available where the customers can manually search permutations and view results in real time. All configurations and scoring permutations are also visible and configurable via the interface.
- Accessibility standards
- WCAG 2.1 A
- Accessibility testing
- Tested with QA engineers who use screen readers, magnifiers and text to speech systems. Issues that were identified were fixed and the users retested them which resulted in a pass in the assistive testing scenarios.
- API
- Yes
- What users can and can't do using the API
- A Restful API is provided in order to search, score, index and synchronise data.
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
The user can customise the scoring configuration, weighting and thresholds for identity searches.
The client can request additional scoring types or search functionality to be added at an additional cost.
Scaling
- Independence of resources
- When provided as a managed service environments are logically segregated to prevent users and customers from accessing resources not assigned to them.
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Physical access control, complying with another standard
- Data sanitisation process
- No
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- User data is not stored by the same
- Data export formats
- Other
- Other data export formats
- JSON
- Data import formats
- Other
- Other data import formats
- Not applicable
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- Availability SLAs will be defined on a per-deployment basis
- Approach to resilience
- Available on request
- Outage reporting
- Available on request
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- Role based access control
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- ISO/IEC 27001
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
At Tetra, we adhere to industry-leading Agile and DevSecOps principles to ensure efficient and secure configuration and change management processes.
Our approach is rooted in collaboration, automation, and continuous improvement, enabling us to deliver high-quality solutions while mitigating risks. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- We utilise industry standard tools to scan for OSS vulnerabilities and to continuously deploy patch our open source dependencies and libraries.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- We do not currently have protective monitoring outwith the cloud provider defaults.
- Incident management type
- Supplier-defined controls
- Incident management approach
-
At Tetra, we have robust incident management processes to swiftly respond to security incidents:
We maintain pre-defined processes for common events, regularly reviewed and refined.
Users report incidents through designated channels. Following resolution, we provide comprehensive incident reports to stakeholders, detailing the incident nature, actions taken, and lessons learned.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Equal opportunity
- Wellbeing
Fighting climate change
At Tetra, we're committed to combatting climate change. We partner with net-zero technology leaders like G-Cloud and Github, ensuring our operations are eco-friendly.
We encourage sustainable travel and remote work to reduce our carbon footprint. Embracing digital tools, we've created a paperless office, cutting waste and boosting efficiency.
By championing recycling and waste reduction, Tetra leads by example.Equal opportunity
At Tetra, we champion equal opportunity. Our employment decisions are grounded in merit and business requirements, fostering an environment that's fair and inclusive.
Candidates selected by Tetra undergo standard screening checks. For roles entailing access to sensitive information, we may conduct advanced checks to uphold security and confidentiality.Wellbeing
At Tetra, we place a strong emphasis on personal well-being, empowering our employees to manage their time effectively.
We encourage a healthy work-life balance by promoting activities such as walking at lunchtime. Additionally, we offer flexibility in working arrangements, including remote and in-office options, to accommodate individual preferences and needs.
Tetra is committed to fostering a supportive environment where our employees can thrive both personally and professionally.
Pricing
- Price
- £195,000 a licence a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Licences are available for use as part of a defined and agreed PoC, subject to NDA.