Skip to main content

Help us improve the Digital Marketplace - send your feedback

ALVISS.AI

Article Explorer

The Article Explorer provides a search engine to find scientific articles and information about their quality.

Features

  • remove access
  • big data analytics

Benefits

  • flexible search engine
  • big data

Pricing

£1.99 to £2,000 a unit a month

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at overtchouk.pavel@gmail.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 13

Service ID

2 4 2 0 7 0 0 6 2 4 4 2 2 6 4

Contact

ALVISS.AI Pavel Overtchouk
Telephone: +33629746156
Email: overtchouk.pavel@gmail.com

Service scope

Software add-on or extension
No
Cloud deployment model
Private cloud
Service constraints
No
System requirements
Commonly used navigators with recent versions will work

User support

Email or online ticketing support
No
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
Web chat
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
Users can chat.
Web chat accessibility testing
None.
Onsite support
No
Support levels
We provide support when needed, i.e contacted by chat, email or phone.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
A guiding tour is provided and can be followed anytime.
Service documentation
Yes
Documentation formats
HTML
End-of-contract data extraction
They ask our support team.
End-of-contract process
Subscription ends. Access to the application ends.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
  • MacOS
  • Windows
  • Windows Phone
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
It is a responsible web application. The design will automatically adapt to the screen size.
Service interface
Yes
User support accessibility
None or don’t know
Description of service interface
Responsive web applicaiton.
Accessibility standards
None or don’t know
Description of accessibility
Users can type and click inside the application.
Accessibility testing
None.
API
Yes
What users can and can't do using the API
Users can access the API only if they ask for this type of feature.
API documentation
No
API sandbox or test environment
No
Customisation available
Yes
Description of customisation
Users can fine tune the analysis to get more results corresponding to their needs.

Scaling

Independence of resources
Access to the information is separated between the different users and based on user settings.

Analytics

Service usage metrics
No

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
European Economic Area (EEA)
User control over data storage and processing locations
No
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least every 6 months
Penetration testing approach
In-house
Protecting data at rest
Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Users ask for the export to the support team.
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
24/7 with >99% availability
Refunds on case by case basis based on the time of unavailability
Approach to resilience
Our host if AWS.
Outage reporting
Email alerts

Identity and authentication

User authentication needed
Yes
User authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels
Session tokens.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
Between 1 month and 6 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
Between 1 month and 6 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
Security watch, regular updating and upgrading, proactive testing and patching,
Information security policies and processes
Keeping the records of potential security failures and patches.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Mostly handled by the host, AWS.
Regular security updates and upgrades to the latest versions available.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Proactive search of possible security breaches.
Patches are deployed immediately after a possible breach has been identified.
Potential threats are sought in the documentation provided by the supplier as well as cybersecurity newsletters.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Connections are logged and history of accesses are kept.
Potential compromises are investigated.
Incidents are responded to immediately after identification,
Incident management type
Supplier-defined controls
Incident management approach
Information brought to the concerned people.
Reporting is possible by the Contact us form or through Report modals present in the application.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Fighting climate change

Fighting climate change

We are using a commercial cloud for our hardware.
We provide information about scientific progress in climate change and ways to find experts in climate change.
Covid-19 recovery

Covid-19 recovery

We provide services to help COVID-19 recovery.
Tackling economic inequality

Tackling economic inequality

We are working towards economic equality.
Equal opportunity

Equal opportunity

We are in favour of equal opportunity.
Wellbeing

Wellbeing

We help achieving wellbeing.

Pricing

Price
£1.99 to £2,000 a unit a month
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Part of the services are available for a free trial online with restricted access after multiple searched.
Link to free trial
https://www.welcome.alviss.ai/alboard/#/dashboard

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at overtchouk.pavel@gmail.com. Tell them what format you need. It will help if you say what assistive technology you use.