Laser Eye
Laser Eye is a Problem Sourcing and Curation tool that shows you who in academia, the industrial base, and across US-UK militaries who else is working on a problem similar to yours. Ideal for innovation, transformation, and change leaders.
Features
- Uses multiple and ever-expanding sets of open source LLMs
- Machine learning and AI make sense of Open Source data
- Deployable for mobile and desktop
- Natural Language Processing for problem queries
- Realtime reporting and dashboard functionality
- Activity report generation on the fly
- Access to insights from proprietary BMNT problem data sets
- Access to wide array of government procurement data
- Match Open Source data to user problems
- Highly Secure
Benefits
- Determine next best action to progress a problem
- Identify the most impactful problems to work on
- Increase effectiveness of innovation to adoption and scale
- Connect people with similar problems for co-creation and testing
- Build scalable and repeatable innovation patterns
- Quickly connect problems with known solutions
- Understand who else is working on a similar problem
- Access problem and solution data from anywhere
- Manage Problem Portfolios
- Find the best/viable solutions to problems
Pricing
£150,000 to £250,000 a unit
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
3 7 4 2 9 6 2 7 8 3 1 2 0 3 9
Contact
BMNT LTD
Kevin Nicholas
Telephone: 07946114281
Email: knicholas@bmnt.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Service constraints
- N/A
- System requirements
-
- Windows 10 or Mac OS X 10.13 or higher
- IOS 12, Android 10, or higher
- Safari, Chrome, Firefox or Edge browser (latest version)
- Public internet connectivity (Firewalls may restrict access)
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Standard response times are with 1 business day.
- User can manage status and priority of support tickets
- No
- Phone support
- No
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Standard: email reply within 2 business days, fielded by on-duty technical account manager. Cost: included with license.
Premium: email reply within 2 hours, dedicated technical account manager. Cost: £2,500/mo - Support available to third parties
- No
Onboarding and offboarding
- Getting started
-
Users contact us at a designated email address to request a Laser Eye account for their organization. Included as part of this request is a list of initial users.
We provide documentation and online training, as well as onboarding webinars. - Service documentation
- Yes
- Documentation formats
- HTML
- End-of-contract data extraction
- The organization's point of contact may request a .csv download of that organization's user data.
- End-of-contract process
- The customer organization is provided an export of their data upon request, and their user accounts are closed. There are no additional costs.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
- Authorised users can access all stored information via an API. Users can request access credentials and are provided secret and public use keys. The API service allows for all standard CRUD functionality with respect to data associated with people, organisations, problems, and solutions. Users are not permitted to edit existing user permissions via the API.
- API documentation
- Yes
- API documentation formats
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Can be customised to run problem matching on any open source or accessible (with data owner's permission) data source.
Scaling
- Independence of resources
- The InsightAI platform is hosted in Amazon's public cloud, behind an intelligent services that pro-actively allocates additional resources when certain system parameters achieve defined thresholds.
Analytics
- Service usage metrics
- Yes
- Metrics types
- We provide usage metrics for most activities within the InsightAI system, surrounding people, organizations, problems and solutions. We track changes to attributes of each of these entities as part of our active metrics approach. We include usage metrics such as: Campaign reach, number of interactions, duration, user role, user attributes, topic modelling, sentiment analysis, topic priority and response drill down
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Data sanitisation process
- No
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- Only an organisation's main point of contact can request data export. This will be provided via downloadable .csv file of the raw data
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
In order to enable the client to do business effectively, Vendor guarantees that certain items will be available for a certain percentage of time.
The Laser Eye system is guaranteed to have a 99.9% uptime.
Uptime is measured over each calendar month. It is calculated to the nearest minute, based on the number of minutes in the given month (for instance, a 31-day month contains 44,640minutes).
If uptime for any item drops below the relevant threshold, a penalty will be applied in the form of a credit for the client. This means the following month’s fee payable by the client will be reduced on a sliding scale.
The level of penalty will be calculated depending on the number of hours for which the service was unavailable, minus the downtime permitted by the SLA:
Important notes:
• Uptime penalties in any month are capped at 50% of the total monthly fee
• Uptime measurements exclude periods of routine maintenance. These must be agreed between Vendor and client in advance. - Approach to resilience
- We rely on Amazon's native hardware and network resiliency plan. The Laser Eye system is load balanced across multiple availability zone to ensure application resiliency.
- Outage reporting
- We plan on publishing a public status dashboard within the next six months.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Username or password
- Access restrictions in management interfaces and support channels
- Management interfaces and support channels are IP-restricted and require authenticated VPN to access.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
- Cyber Essentials Certification
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- NIST-800-171r1
- Information security policies and processes
-
Principles
The company shall provide all employees and contracted third parties with access to the information they need to carry out their responsibilities as effectively and efficiently as possible.
General
a. Each user shall be identified by a unique user ID so that individuals can be held accountable for their actions.
b. The use of shared identities is permitted only where they are suitable, such as training accounts or service accounts.
c. Each user shall read this data security policy and the login and logoff guidelines, and sign a statement that they understand the conditions of access.
d. Records of user access may be used to provide evidence for security incident investigations.
e. Access shall be granted based on the principle of least privilege, which means that each program and user will be granted the fewest privileges necessary to complete their tasks.
Access Control Authorization
Access to company IT resources and services will be given through the provision of a unique user account and complex password. Accounts are provided by the IT department based on records in the HR department.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Core components of the Laser Eye system are version numbered and routinely refactored and updated as part of our ongoing development process. All changes to the system are monitored for security compliance as part of our general deployment procedures.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
We actively perform dynamic and static vulnerability testing on our services.
We aim to deploy security-related updates as soon as the updates to the affected packages are made available by the authors/contributors.
We regularly monitor vulnerability reporting forums and services to keep abreast of the latest vulnerability alerts that may affect the Laser Eye system. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
We maintain intrusion detection system and active analytics of user behavior in the system. We have developed custom alerts that trigger when non-standard user behavior is detected.
We respond to incidents within 4-hours of detection. - Incident management type
- Supplier-defined controls
- Incident management approach
-
We monitor for common events within our systems and also provide users the ability to alert our team of incidents via email.
We provide incident details and status notifications via our public dashboard.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Equal opportunityEqual opportunity
Our LLMs are trained to find the best people to work on solutions based entirely on agnostic data that indicates they are working on a similar problem or have expertise in a specific domain. This will have the effect of encouraging our users to consider all potential collaborators equally and diversify the supplier base.
Pricing
- Price
- £150,000 to £250,000 a unit
- Discount for educational organisations
- No
- Free trial available
- No