Skip to main content

Help us improve the Digital Marketplace - send your feedback

Collaboration Tools Ltd

Trustworthy Generative AI for Analysis of Documents and Other Data

Trustworthy AI to query documents and data using non-technical plain English language.

1. Each element of a response is linked to its source text, making answers explainable.

2. Spurious content is eliminated, making answers correct.

3. All relevant material, including hidden connections, are derived for the response, making answers complete.

Features

  • Vector and graph index a document corpus to answer queries
  • Host vector and graph indexes for a document corpus
  • Maintain vector and graph indexes for a document corpus
  • Develop user interfaces to query a document corpus

Benefits

  • Responses fully explained through links to source text
  • Spurious content eliminated to ensure answers are correct
  • All relevant information and connections derived to make answers complete

Pricing

£25,000.00 a unit

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at khb@collaboration-tools.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

3 1 5 8 8 7 4 4 6 9 5 7 3 6 3

Contact

Collaboration Tools Ltd Keith Harrison-Broninski
Telephone: 07917284434
Email: khb@collaboration-tools.com

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints
The service is unavailable for a brief window between 0300 and 0500 daily, during which backups are taken and upgrades installed. Upgrades are always backwards-compatible.
System requirements
  • On-premises deployment requires GPU or equivalent capability in servers
  • Hosted deployment has no system requirements for users

User support

Email or online ticketing support
Email or online ticketing
Support response times
Within 1 hour at all times
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
Web chat
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
WCAG 2.1 AA or EN 301 549
Web chat accessibility testing
Fully tested with assistive technology users by cloud platform provider
Onsite support
Yes, at extra cost
Support levels
Hosted service includes 24x7 helpdesk with 1 hour response time.

Support for on-premises services is provided by arrangement with each customer.

Each customer has a dedicated technical account manager.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
The nature of our service (plain English language querying) means that no training is required for users.
Service documentation
No
End-of-contract data extraction
We can provide indexes in a variety of export formats, as required by the customer.
End-of-contract process
Export of vector and graph indexes may incur an extra cost, depending on the format required.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
The chat interface is similar on both types of device.
Service interface
Yes
User support accessibility
WCAG 2.1 AA or EN 301 549
Description of service interface
The service interface is developed bespoke for each customer.
Accessibility standards
WCAG 2.1 AA or EN 301 549
Accessibility testing
Each service interface is tested with users of assistive technology.
API
Yes
What users can and can't do using the API
We provide a RESTful API to the hosted service.

We can support customers in configuring a similar API for on-premises deployments.
API documentation
Yes
API documentation formats
Open API (also known as Swagger)
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
The service is customised automatically for each customer since it is based on their own document / data corpus and each user interface is bespoke.

Scaling

Independence of resources
Each customer has their own dedicated hosting service, separate from those used for other customers

Analytics

Service usage metrics
Yes
Metrics types
Number of queries

Number of tokens used by queries
Reporting types
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least every 6 months
Penetration testing approach
In-house
Protecting data at rest
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Exports of vector and graph indices are provided on request.
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats
Bespoke on demand
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats
Our service supports all standard document and data formats

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
The service is unavailable for a brief window between 0300 and 0500 daily, during which backups are taken and upgrades installed. Upgrades are always backwards-compatible.

At other times, 99.9% uptime with service costs refunded for any time spent in breach.
Approach to resilience
Available on request
Outage reporting
Email alerts

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels
We ensure:

1. Privileged users carry out their administrative duties in a ‘clean’ (more trusted) environment.

2. Privileged users handle their email and web browsing in a separate ‘dirty’ (less trusted) environment.

3. Use strong authentication mechanisms, including 2-factor authentication.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Username or password

Audit information for users

Access to user activity audit information
Users receive audit information on a regular basis
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users receive audit information on a regular basis
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
ITIL v4

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
ITIL Change Management, including:

Change Management Support
Assessment of Change Proposals
RFC Logging and Review
Assessment and Implementation of Emergency Changes
Change Assessment by the Change Manager
Change Assessment by the CAB
Change Scheduling and Build Authorization
Change Deployment Authorization
Minor Change Deployment
Post Implementation Review and Change Closure
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
We use NCSC vulnerability management principles:

1. We apply updates as soon as possible, automatically

2. We know what systems and software are on our technical estate, who is responsible for what, and which vulnerabilities are present.

3. If we cannot update affected software or an update doesn’t fix the reported vulnerability or misconfiguration, we triage and prioritise.

4. There are sometimes legitimate reasons not to update, so the decision is always considered in the wider context of our organisational risk management policy and practice.

5. We evolve our vulnerability management process continually to keep pace with new challenges
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
We log and monitor all activity on our networks to identify patterns of activity, which in turn provide indicators of compromise. In the event of incidents, logging data is used to effectively identify the source and the extent of compromise.
Incident management type
Supplier-defined controls
Incident management approach
All incidents go straight to our IM team where they are triaged and categorised according to their severity and potential impact. This informs our response and ensures we direct our resources towards managing the most significant incidents.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

Our company mission is to use leading edge technology for social value. This includes making information available to communities of all types on effective approaches to climate adaptation.

Covid-19 recovery

Our company mission is to use leading edge technology for social value. This includes making information available to communities of all types on effective approaches to public health.

Tackling economic inequality

Our company mission is to use leading edge technology for social value. This includes making information available to communities of all types on effective approaches to tackling economic inequality.

Equal opportunity

Our company mission is to use leading edge technology for social value. This includes making information available to communities of all types on effective approaches to equal opportunity.

Wellbeing

Our company mission is to use leading edge technology for social value. This includes making information available to communities of all types on effective approaches to building wellbeing.

Pricing

Price
£25,000.00 a unit
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at khb@collaboration-tools.com. Tell them what format you need. It will help if you say what assistive technology you use.