Dataiku
Dataiku is the platform for Everyday AI, systemizing the use of data for exceptional business results. Create, share, and reuse applications that leverage data and machine learning to extend and automate decision making. Scale AI effectively across all dimensions and deliver advanced analytics using the latest techniques at enterprise scale
Features
- Data preparation
- Data visualisation
- Machine Learning
- DataOps
- Healthcare MLOps
- Analytical Apps
- Collaboration
- Governance
- Explainable AI
- Flexible, hybrid Architecture
Benefits
- Easily build data pipelines to join & transform datasets
- Quick visual analysis of columns & categorical data
- User supported & guided use of ML
- Centralised Dataiku projects for all work and collaboration for users.
- Dataiku unified deployer manages project files’ movement between design nodes
- Easily create project dashboards and share them with business users.
- Visual flow is the canvas where teams collaborate on projects
- Dataiku permissions controls team permission at the project level
- Dataiku provides critical capabilities for explainable AI,
- Dataiku can run on-premise or in the cloud
Pricing
£15,000 to £200,000 a licence a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
2 8 6 7 0 4 6 2 9 6 8 6 7 0 2
Contact
INTERWORKS EUROPE LTD
Daniel Rostron
Telephone: 07531541276
Email: Daniel.rostron@interworks.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
- No particular constraints
- System requirements
- Standard web browser based user interface
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Within 4 hours Mon - Fri 9am - 5pm
24/7 service is available on request at an additional cost depending on size of environment - User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
We provide office hours support desk service via email, phone and video conference.
Support is provided free of charge for anything to do with ensuring that the software is working as it should. Support is only charged for work which would classify as consulting assistance - this is usually separately agreed with clients in advance.
All accounts have an assigned account manager. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- InterWorks has a team of Dataiku accredited data engineers can perform initial setup of your Dataiku instance, configure data connections and outputs and set up some example models.
- Service documentation
- Yes
- Documentation formats
- HTML
- End-of-contract data extraction
-
Source data is not retained within Dataiku platform.
Trained models can be exported from Dataiku in XML format at any time during the contract. - End-of-contract process
- At the end of the contract the licences expire, users are no longer able to log in and access the service. After a short grace period, any data held is deleted.
Using the service
- Web browser interface
- No
- Application to install
- Yes
- Compatible operating systems
-
- Linux or Unix
- Windows
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
- Core services available through the API, more specific details available on request.
- API documentation
- Yes
- API documentation formats
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- No
Scaling
- Independence of resources
- Each client's installation is hosted in a dedicated virtual machine. Scaling of the virtual machine is under the control of the client.
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Dataiku
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Data sanitisation process
- No
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Dataiku provides ability to make predictions (and explanations), results of which are then written to the database, or exported to flat file. Dataiku as a platform does not retain any user data.
- Data export formats
-
- CSV
- Other
- Other data export formats
- Relational or analytical databases
- Data import formats
-
- CSV
- Other
- Other data import formats
- Relational or analytical databases
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- Dataiku does not offer specific guarantees around levels of availability
- Approach to resilience
- Where a Dataiku VM is hosted in the cloud, it relies primarily on the resilience of the hosting cloud platform.
- Outage reporting
- N/A
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Management Interfaces and support channels are secured using roles applied to users to maintain the separation of ability of users. The system is designed to allow only specific and absolutely necessary users the ability to alter authentication and authorisation. Default permission for new users is always set to deny all access until it is specifically granted by and administrative account.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
-
- Soc 2 Type II compliance
- CIA C2S Cloud
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- Given our role as data analysts we take data security very seriously. We do have an internal security governance policy but this is not currently one that is accredited to an external standard. We have never had a security incident or breach.
- Information security policies and processes
-
We have a detailed IT Policy (Security and Internet) which we can make available on demand. The key points of which are:
Roles and responsibilities - the policies are established, monitored and breaches investigated by the directors, but at a core level everyone has a responsibility for security.
Monitoring - we reserve the right to monitor employee use of IT resources, tracking and remote wipe software is installed on all devices
Damage and loss - defined actions in the event of damage or loss of equipment
Misuse and vandalism
Specific guidelines concerning encryption and security admin policies of portable devices, memory sticks, mobile phones, laptops, AV software, email attachments, commitments in emails, IM systems, licensing of software, and password policies.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Dataiku uses industry standard source control and change management processes throughout the software development lifecycle.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- AWS has a built in vulnerability testing process which allows the on demand testing of an AWS instance (that we control / have access to).
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- No specific protective monitoring measures built into the product. Relies on protective monitoring from the hosting platform...
- Incident management type
- Supplier-defined controls
- Incident management approach
-
User reported incidents go to our support desk for triage. If the support desk cannot resolve it immediately it is escalated to the correct specialist within the team.
Incidents discovered by our team would be notified directly to the client. Minor issues would usually be resolved then alerted. Major issues would be alerted first and then the focus would move on to resolution.
Incidents are reported via email
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Equal opportunityEqual opportunity
Dataiku are an equal opportunity employer and are dedicated to achieving equal rights
Pricing
- Price
- £15,000 to £200,000 a licence a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- 14 day free trial available