Skip to main content

Help us improve the Digital Marketplace - send your feedback

RCUBE LABS LTD

Data Solution - DataBeagle

DataBeagle offers ways to discovery of relevant sensitive information. The product has been created by leveraging Microsoft Azure, HCI/HCP.
DataBeagle performs the active analysis of internal data designed to reduce risks associated with business practices and provides the facilitation of legal processes associated with eDiscovery which reduce cost and time.

Features

  • Data Collection and Processing
  • Enrichment & Transformation
  • Advance Search
  • Data Protection and Data Insights
  • Review and tagging
  • Redaction & Masking
  • Movement & Export
  • Case Management
  • Suspect Analysis
  • Sensitive Data management

Benefits

  • Discovery of relevant sensitive information
  • Active analysis of internal data
  • Facilitates legal processes associated with eDiscovery

Pricing

£300 a unit a day

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at rajmohan.ek@rcubelabs.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

3 8 6 4 3 5 1 4 7 5 8 8 6 8 1

Contact

RCUBE LABS LTD Rajmohan E.K
Telephone: +447918197847
Email: rajmohan.ek@rcubelabs.com

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints
No constraints
System requirements
  • Hardware Requirements: Memory, Storage, Cloud, On-Prem.
  • Operating System: Windows, Linux, macOS, iOS, Android
  • Software Dependencies: Libraries, frameworks, runtime environments.
  • Data Backup and Recovery
  • Compliance and Governance: Auditing, logging, reporting for compliance efforts.
  • Network Connectivity: Bandwidth, latency, reliability.

User support

Email or online ticketing support
Email or online ticketing
Support response times
As per agreed SLAs with customer
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
9 to 5 (UK time), 7 days a week
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Different models of support are as below. The exact model and levels of support will be agreed mutually with the buyer.
Managed Support
Premium (24x7) Support - On call
Standard plus (12x7) Support - On call
Standard support (8*5) Support - On call
We can provision a technical account manager and/or a cloud support engineer if agreed in the contract. Costs will depend upon a number of factors and it will be negotiated during the contract.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Deployment, Onsite training, remote training, videos, step-by-step documentation, interactive help.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
Data extraction scripts are provided. Data extraction services are provide at an extra cost.
End-of-contract process
The product is included in the price. Everything else from implementation, training, exit assistance are charged separately.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Chrome
  • Safari
  • Opera
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
  • Linux or Unix
  • MacOS
  • Windows
Designed for use on mobile devices
No
Service interface
No
User support accessibility
None or don’t know
API
Yes
What users can and can't do using the API
This will need a conversation with the Customer to understand their systems and provide/build a set of APIs
API documentation
Yes
API documentation formats
PDF
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
There are some aspects that can be customised by the users. However, the product can be modified as per Customer's requirements.

Scaling

Independence of resources
Depends on deployment options chosen by Customer

Analytics

Service usage metrics
Yes
Metrics types
Availability, Uptime, Performance,
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Yes
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
Never
Protecting data at rest
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Using scripts provided by us and some functionality built into the software.
Data export formats
CSV
Data import formats
  • CSV
  • Other
Other data import formats
  • PDF Documents
  • Office Documents
  • Images

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
SLAs are agreed with the Customer and Service Credits are provided for any non-availability
Approach to resilience
Available on request
Outage reporting
Public dahsboard and email alerts

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels
Role-Based Access Control (RBAC): Implement role-based access control mechanisms to restrict access to management interfaces and support channels based on predefined roles and permissions.
Least Privilege Principle: Apply the principle of least privilege to grant users the minimum level of access required to perform their job functions. Limit access to sensitive management interfaces and support channels
Authentication and Authorization: Require users to authenticate using strong authentication methods, such as username/password, multi-factor authentication (MFA),biometric authentication, before granting access to management interfaces and support channels. Once authenticated, users are authorized to access only the resources and functionalities necessary for their roles.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
Available on request
Information security policies and processes
Internal security management system

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
We follow industry ITIL framework for configuration and change management
Vulnerability management type
Undisclosed
Vulnerability management approach
Our vulnerability management process starts with regular vulnerability scans across all systems and networks. Identified vulnerabilities are prioritized based on severity and potential impact. Remediation plans are promptly developed and implemented to address critical vulnerabilities. Continuous monitoring and reevaluation ensure that new vulnerabilities are promptly identified and addressed. Regular reporting and analysis help track progress and ensure compliance with security policies and regulations.
Protective monitoring type
Undisclosed
Protective monitoring approach
Regular testing and immediate response to any incidents involving technical experts
Incident management type
Undisclosed
Incident management approach
Identification and logging of security incidents.
- Classification of incidents based on severity and impact.
- Assigning appropriate resources to investigate and resolve incidents.
- Implementing containment and mitigation measures to minimize impact.
- Documenting and analyzing incidents to prevent recurrence and improve incident response capabilities.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

Equal opportunity

Equal opportunity

We are an equal opportunity employer and do not discriminate anyone based on any parameter.

Pricing

Price
£300 a unit a day
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Available upon request

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at rajmohan.ek@rcubelabs.com. Tell them what format you need. It will help if you say what assistive technology you use.