Data Solution - DataBeagle
DataBeagle offers ways to discovery of relevant sensitive information. The product has been created by leveraging Microsoft Azure, HCI/HCP.
DataBeagle performs the active analysis of internal data designed to reduce risks associated with business practices and provides the facilitation of legal processes associated with eDiscovery which reduce cost and time.
Features
- Data Collection and Processing
- Enrichment & Transformation
- Advance Search
- Data Protection and Data Insights
- Review and tagging
- Redaction & Masking
- Movement & Export
- Case Management
- Suspect Analysis
- Sensitive Data management
Benefits
- Discovery of relevant sensitive information
- Active analysis of internal data
- Facilitates legal processes associated with eDiscovery
Pricing
£300 a unit a day
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
3 8 6 4 3 5 1 4 7 5 8 8 6 8 1
Contact
RCUBE LABS LTD
Rajmohan E.K
Telephone: +447918197847
Email: rajmohan.ek@rcubelabs.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- No constraints
- System requirements
-
- Hardware Requirements: Memory, Storage, Cloud, On-Prem.
- Operating System: Windows, Linux, macOS, iOS, Android
- Software Dependencies: Libraries, frameworks, runtime environments.
- Data Backup and Recovery
- Compliance and Governance: Auditing, logging, reporting for compliance efforts.
- Network Connectivity: Bandwidth, latency, reliability.
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- As per agreed SLAs with customer
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Different models of support are as below. The exact model and levels of support will be agreed mutually with the buyer.
Managed Support
Premium (24x7) Support - On call
Standard plus (12x7) Support - On call
Standard support (8*5) Support - On call
We can provision a technical account manager and/or a cloud support engineer if agreed in the contract. Costs will depend upon a number of factors and it will be negotiated during the contract. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Deployment, Onsite training, remote training, videos, step-by-step documentation, interactive help.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- Data extraction scripts are provided. Data extraction services are provide at an extra cost.
- End-of-contract process
- The product is included in the price. Everything else from implementation, training, exit assistance are charged separately.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Linux or Unix
- MacOS
- Windows
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
- This will need a conversation with the Customer to understand their systems and provide/build a set of APIs
- API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- There are some aspects that can be customised by the users. However, the product can be modified as per Customer's requirements.
Scaling
- Independence of resources
- Depends on deployment options chosen by Customer
Analytics
- Service usage metrics
- Yes
- Metrics types
- Availability, Uptime, Performance,
- Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- Never
- Protecting data at rest
-
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- Using scripts provided by us and some functionality built into the software.
- Data export formats
- CSV
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- PDF Documents
- Office Documents
- Images
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- SLAs are agreed with the Customer and Service Credits are provided for any non-availability
- Approach to resilience
- Available on request
- Outage reporting
- Public dahsboard and email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Access restrictions in management interfaces and support channels
-
Role-Based Access Control (RBAC): Implement role-based access control mechanisms to restrict access to management interfaces and support channels based on predefined roles and permissions.
Least Privilege Principle: Apply the principle of least privilege to grant users the minimum level of access required to perform their job functions. Limit access to sensitive management interfaces and support channels
Authentication and Authorization: Require users to authenticate using strong authentication methods, such as username/password, multi-factor authentication (MFA),biometric authentication, before granting access to management interfaces and support channels. Once authenticated, users are authorized to access only the resources and functionalities necessary for their roles. - Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- Available on request
- Information security policies and processes
- Internal security management system
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- We follow industry ITIL framework for configuration and change management
- Vulnerability management type
- Undisclosed
- Vulnerability management approach
- Our vulnerability management process starts with regular vulnerability scans across all systems and networks. Identified vulnerabilities are prioritized based on severity and potential impact. Remediation plans are promptly developed and implemented to address critical vulnerabilities. Continuous monitoring and reevaluation ensure that new vulnerabilities are promptly identified and addressed. Regular reporting and analysis help track progress and ensure compliance with security policies and regulations.
- Protective monitoring type
- Undisclosed
- Protective monitoring approach
- Regular testing and immediate response to any incidents involving technical experts
- Incident management type
- Undisclosed
- Incident management approach
-
Identification and logging of security incidents.
- Classification of incidents based on severity and impact.
- Assigning appropriate resources to investigate and resolve incidents.
- Implementing containment and mitigation measures to minimize impact.
- Documenting and analyzing incidents to prevent recurrence and improve incident response capabilities.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Equal opportunityEqual opportunity
We are an equal opportunity employer and do not discriminate anyone based on any parameter.
Pricing
- Price
- £300 a unit a day
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Available upon request