Skip to main content

Help us improve the Digital Marketplace - send your feedback

DATASUMI LTD

Generative AI for Enterprise with Amazon Q

Datasumi elevates your business by leveraging the power of generative artificial intelligence (AI) through Amazon Q Business. Our all-encompassing training and consulting service, Q Insights, is committed to assisting you in realising the complete value of this innovative technology.

Features

  • Tailored team training sessions
  • Custom Amazon Q Business solution
  • Dedicated access to AI experts
  • Comprehensive training program
  • Seamless integration with existing systems
  • Ongoing support and guidance
  • Customized consulting services
  • Cutting-edge technology access
  • Dedicated project management
  • Flexible training options

Benefits

  • Automate repetitive tasks
  • Actionable insights generation
  • Personalised customer experiences
  • Boosted productivity and reduced workload
  • Competitive advantage with AI technology
  • Business growth and revenue increase
  • Improved collaboration and communication
  • Enhanced customer satisfaction and retention
  • Reduced costs associated with manual tasks
  • Increased transparency and accountability in government operations.

Pricing

£575 a unit a day

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at accounts@datasumi.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

4 1 8 7 5 8 9 7 0 9 0 2 6 3 3

Contact

DATASUMI LTD Datasumi Team
Telephone: +442045770319
Email: accounts@datasumi.com

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Datasumi's service is an extension to Amazon Web Services (AWS), specifically Amazon Q Business.By integrating with existing enterprise systems and workflows, Datasumi's service helps businesses streamline their operations, automate repetitive tasks.
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints
Before using our service, please note the following constraints that may affect your experience. We require access to specific technical resources, such as AWS accounts and data sources, for proper functioning. Ensure you have these resources in place beforehand. While we strive for customisation, there may be limitations due to technical or resource constraints. We prioritise data privacy and security; review our policies and procedures to ensure compliance with your requirements. Our service is subject to availability, and not all requests can be accommodated instantly. Finally, consider your budget and potential ROI before engaging with us.
System requirements
AWS

User support

Email or online ticketing support
Email or online ticketing
Support response times
Same day
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
WCAG 2.1 AA or EN 301 549
Web chat accessibility testing
Webchat, We support assistive technology users through Zendesk.
Onsite support
Yes, at extra cost
Support levels
Support needs are meticulously assessed and aligned with the client's unique business requirements. This involves a comprehensive analysis of operational demands, challenges, and objectives to tailor support services effectively. By harmonizing support needs with business goals, a personalized support plan is developed to address specific requirements and ensure peak performance. Collaborative discussions and industry understanding lead to support agreements that meet expectations and enhance operational efficiency. This strategic approach aligns support services with the client's overarching business strategy, fostering a partnership focused on effectively meeting their needs. Integrating client input and business insights into the support planning process establishes a tailored support framework that offers precise assistance and solutions in line with the client's vision and objectives.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We recognize that introducing a new service can be daunting, so we provide extensive support to ensure a smooth transition. Our goal is to enable users to quickly and effectively leverage the benefits of our service.

To get started, our dedicated team assists with account setup, environment configuration, and data source integration. We also offer step-by-step guides and tutorials to navigate our intuitive interface.

For more in-depth guidance, we provide various training options: onsite training sessions for large-scale implementations, online training programs featuring video tutorials, interactive simulations, and live webinars. Additionally, our comprehensive user documentation includes guides, FAQs, and knowledge base articles, available 24/7.

Once users are up and running, our dedicated support team is available via phone, email, or chat to address any questions, concerns, or issues. We also maintain an active community forum where users can share knowledge, ask questions, and receive feedback from our experts and other users.
Service documentation
Yes
Documentation formats
HTML
End-of-contract data extraction
We prioritize data ownership and understand its importance for our customers. To guarantee a seamless transition at the end of our contract, we have developed a user-friendly data extraction process.

Our dedicated support team will notify users 30 days before the contract expiration date with instructions on how to extract their data. Upon notification, users can access a secure portal where they can download their stored data in a format of their choice (e.g., CSV, JSON).

Our team is committed to assisting users in exporting their data, ensuring that all relevant information is extracted and made available for future use. We also provide dedicated support during the data extraction process to address any questions or concerns.

To further aid our customers, we offer detailed documentation on the data export process, including step-by-step guides and FAQs. Additionally, our support team is available at any time to provide assistance with data extraction.
End-of-contract process
End of Contract
At the end of our contract, we ensure a smooth transition for our customers by providing a comprehensive data extraction process. This allows users to retain ownership of their data and easily move to new solutions.

What's Included in the Price
Our contract price includes access to our platform with all its features and functionalities, ongoing support from our dedicated team, regular software updates and maintenance, and data storage and processing capabilities.

Additional Costs
In addition to the base price, there may be extra costs for certain services or features. These include custom development or customization of our platform to meet specific user requirements (additional fee), additional data storage or processing beyond what is included in the contract (additional fee), and priority support for urgent issues (additional fee).

Please note that all prices and fees are subject to change, and we will communicate any changes clearly to users before they take effect. We strive to be transparent about our pricing and ensure that our customers understand what they can expect when signing up for our services.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
The chat/chatbot uses the full screen.
Service interface
No
User support accessibility
WCAG 2.1 AA or EN 301 549
API
No
Customisation available
Yes
Description of customisation
Our service allows users to customise their experience through various options. Users can choose from different architecture templates or design a custom one with our experts. They can also integrate preferred data sources, select report types and visualisations, and set up custom notifications. Customisation can be done through our user-friendly interface, with the help of our experts, or by integrating with other tools. Authorized administrators, technical experts, and business analysts can all customise the service to meet their specific needs. This level of customisation empowers users to achieve desired outcomes from our service.

Scaling

Independence of resources
We ensure independence of resources through several strategies. Resource isolation uses a multi-tenant architecture to separate each user's data and performance from others. Scalability allows us to add resources as needed to meet increased demand, handling sudden spikes without impacting individual users. Priority queues prioritize critical requests for efficient processing during high demand. Monitoring systems track service performance and alert our team to potential issues before they impact users. Regular maintenance ensures the system remains efficient and responsive. By employing these strategies, we guarantee a seamless experience for all users, regardless of demand.

Analytics

Service usage metrics
Yes
Metrics types
Datasumi's service metrics encompass detailed data on inbound and outbound usage, including inquiry volumes, customer journey insights, and chat durations. The secure online portal offers real-time dashboards, regular reports, and on-demand reports, providing valuable performance insights. Users can export service usage metrics in CSV, XML, and JSON formats. Additionally, Datasumi's services support various data export methods such as APIs, user interface exports (Excel, CSV, JSON, XML), data integration platforms, and database migration tools. These approaches enable structured and efficient data export, empowering users with actionable insights for decision-making and strategic planning.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
Never
Protecting data at rest
Other
Other data at rest protection approach
Within your Cloud framework.
Data sanitisation process
No
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Our approach ensures that users can retrieve their data in the format they need.

Step-by-Step Process

Notification: 30 days before contract expiration, our dedicated support team will notify users and guide them through the data export process.

Data Access: Users gain secure access to a portal where they can download their stored data in various formats (CSV, JSON).

Customization: Users can choose from pre-defined templates or create custom exports tailored to their specific requirements.

Verification: Our support team verifies the export process to ensure all relevant data is extracted and made available for future use.
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats
  • XML
  • JSON
  • Excel
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats
  • XML
  • JSON

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
No guaranteed SLA.
Approach to resilience
Our datacenter setup is designed for maximum resilience, ensuring uninterrupted service and business continuity. We employ a multi-datacenter strategy, replicating critical components across multiple geographic locations. This redundancy enables seamless failover in the event of an issue at one datacenter, minimizing downtime and ensuring continuous availability.

Enhancing Resilience
To further strengthen our infrastructure, we implement additional resilience measures:

Redundant hardware and networking infrastructure

Load balancing and traffic management systems to optimize resource allocation

Regular backups and disaster recovery processes for data protection

Monitoring and alerting systems to detect potential issues before they impact service

Resilience Benefits
Our resilient design yields numerous benefits, including:

Improved uptime and availability

Reduced risk of data loss or corruption

Enhanced business continuity and disaster recovery capabilities

Increased customer trust and satisfaction

While we are happy to provide general information about our resilience measures, the specific details of our datacenter setup are available upon request. We prioritize transparency in building trust with our customers and ensuring their confidence in our services.

Note
Please note that this information is subject to change and may be updated as needed to reflect changes in our infrastructure or service offerings.
Outage reporting
We provide multiple channels for reporting outages:

**Public Dashboard**: Our public dashboard provides a real-time overview of the service status, including any ongoing outages or maintenance activities. The dashboard is available at [insert URL].

**API**: We offer an API that allows developers to retrieve information about the service status, including outage notifications and details. The API can be accessed at [insert URL].

**Email Alerts**: Our system sends automated email alerts to users who have opted-in to receive notifications when there is a planned or unplanned outage. Users can opt-out of these emails at any time.

**Additional Communication Channels**: In addition to our public dashboard, API, and email alerts, we also communicate with users through:
* Support portal: Our support team is available 24/7 to answer questions and provide assistance during outages.

**Outage Notification Process**: When an outage occurs, our system automatically triggers a notification process that sends alerts to our users through the channels mentioned above. We also have a dedicated team that monitors the service status and provides updates on the resolution progress.

By providing multiple channels for reporting outages, we ensure that our users are informed and can plan accordingly during any downtime.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels
Microsoft account id and password or AWS IAM
Access restriction testing frequency
Never
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
Less than 1 month
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
Yes
Any other security certifications
  • AWS cloud platform PCI Certification
  • Azure cloud platform PCI Certification
  • GCP cloud platform PCI Certification

Security governance

Named board-level person responsible for service security
No
Security governance certified
No
Security governance approach
Use IAM sign-on for security - single sign-on. In other word, security is outsourced to Cloud Provider.
Information security policies and processes
Policies and Procedures
Our information security framework includes:

Information Classification Policy: governing the handling, storage, and sharing of sensitive information

Access Control Policy: controlling access to systems, networks, and data

Data Protection Policy: outlining procedures for encrypting, backing up, and recovering user data

Incident Response Policy: guiding response efforts in the event of a security incident

Reporting Structure
Our Information Security Officer (ISO) reports directly to our Chief Technology Officer (CTO) and is responsible for:

Developing and implementing information security policies and processes

Conducting regular security audits and risk assessments

Providing training and awareness programs for employees on information security best practices

Ensuring Policy Compliance
We ensure policy compliance through:

Mandatory annual training for all employees on our information security policies and processes

Regular awareness programs and campaigns to educate employees on information security best practices

Ongoing compliance monitoring by our ISO to identify areas for improvement

Incident response efforts led by our ISO in the event of a security incident

Additional Security Measures
To further enhance our information security, we implement:

Robust access controls, including multi-factor authentication and role-based access control

Regular vulnerability assessments and penetration testing

Encryption in transit and at rest

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Our processes track components throughout their lifecycle and assess changes for potential security impact.

We assign unique identifiers to each component, tracking its design, development, deployment, and retirement in a centralized repository. Changes are assessed against our Security Policy and regulations, evaluating affected components, dependencies, and potential risks.

Approved changes are implemented using automated tools, verified by our Quality Assurance team to ensure proper configuration and no new security vulnerabilities. Post-implementation testing verifies that the change did not compromise service security or introduce new risks.

Our configuration and change management processes guarantee secure, reliable services that comply with relevant regulations.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
We proactively identify, assess, and remediate potential threats to our services through a comprehensive vulnerability management process.

We continuously monitor for vulnerabilities from various sources, including national databases, industry reports, internal monitoring, and threat intelligence feeds. Our team assesses the severity and impact of each potential threat, considering factors like likelihood of exploitation, potential damage, and patch availability.

Once identified, we prioritize remediation based on severity and impact. We deploy patches quickly, following a standardized process: assessment, testing, and deployment to production. Information sources include national databases, industry reports, internal monitoring, and collaboration with other organizations.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
We employ a proactive and comprehensive protective monitoring approach to detect and respond to potential security threats in real-time.

We use advanced threat detection technologies, including anomaly-based systems, signature-based systems, and behavioral analysis tools. Our monitoring capabilities include network traffic analysis, system log analysis, and endpoint monitoring.

When a potential compromise is identified, we respond quickly using our incident response process. Our team assesses the situation, contains the threat, and eradicates malware or malicious code. We also conduct post-incident analysis to identify root causes and implement preventative measures.
Incident management type
Supplier-defined controls
Incident management approach
Our incident management processes are fully facilitated by our Cloud Provider. We have pre-defined processes for common events, ensuring swift and effective responses to incidents. Users report incidents through the designated channels provided by our Cloud Provider. Incident reports and updates are communicated through the tools and systems offered by our Cloud Provider. By leveraging the resources and expertise of our Cloud Provider, Datasumi maintains a structured incident management framework to promptly address and resolve any security issues or disruptions that may arise.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

In combating climate change, Datasumi can elevate its G-Cloud service provision by embracing sustainability initiatives and bolstering environmental resilience. Taking cues from Google Cloud's ambitious targets of operating solely on renewable energy and aiming for 24/7 carbon-free energy by 2030, Datasumi can set similar benchmarks to curtail its carbon footprint and champion sustainable practices across its operations. By harnessing technology to bolster sustainability endeavors and democratizing earth-centric data for informed decision-making, Datasumi can empower organizations to make data-informed choices that bolster climate resilience. Moreover, aligning with social value themes centered on responsible consumption and production, as delineated in the Social Value Model, can underscore Datasumi's dedication to environmental stewardship and sustainability within its service offerings.

By integrating these strategies into its G-Cloud services, Datasumi not only actively contributes to the global battle against climate change but also fosters a more sustainable future. Through a concerted focus on renewable energy adoption, carbon footprint reduction, and promoting eco-conscious practices, Datasumi can position itself as a leader in environmentally responsible service provision. By aligning with sustainability goals and leveraging technology for positive environmental impact, Datasumi can play a pivotal role in advancing climate action and fostering a greener, more sustainable digital landscape.

Tackling economic inequality

In addressing economic inequality through its G-Cloud service provision, Datasumi can focus on initiatives that promote equal access to economic opportunities, support small and medium-sized enterprises (SMEs), and foster diversity within the supply chain. By aligning with social value themes that aim to reduce economic disparities, Datasumi can contribute to creating a more inclusive and equitable business environment. Drawing inspiration from the Social Value Model's emphasis on creating new businesses, jobs, and skills, Datasumi can implement programs that facilitate entrepreneurship, job creation, and skills development for underrepresented groups. Additionally, by supporting educational attainment relevant to contracts, providing training schemes to address skills gaps, and promoting sector-related skills growth, Datasumi can help bridge the economic divide and empower individuals from diverse backgrounds.

Furthermore, by structuring supply chain selection processes to ensure fairness and diversity, encouraging innovation and disruptive technologies, and promoting collaboration throughout the supply chain, Datasumi can actively contribute to reducing economic inequality. Embracing scalable methods for modernizing delivery, supporting apprenticeships and industry placements, and fostering a fair and responsible approach to working with supply chain partners can further enhance economic inclusivity within its service provision. By adopting these strategies and aligning with initiatives that prioritize economic equality, Datasumi can play a pivotal role in fostering a more level playing field for businesses of all sizes and backgrounds within the G-Cloud ecosystem.

Equal opportunity

In the context of equal opportunity, Datasumi enhances its G-Cloud service provision by focusing on promoting diversity, inclusion, and equitable access to opportunities. By aligning with social value themes that prioritize equal opportunities, Datasumi can contribute to fostering a more inclusive and fair society. Drawing inspiration from the Social Value Model's emphasis on supporting local communities in managing and recovering from the impact of COVID-19, Datasumi can implement initiatives that facilitate employment opportunities, re-training programs, and workforce diversity. Additionally, by actively engaging in activities that promote equal access to resources, education, and employment opportunities, Datasumi can demonstrate its commitment to social responsibility and equitable practices within its service provision. Through a concerted effort to prioritize equal opportunity initiatives, Datasumi can play a significant role in advancing social equity and inclusivity within the G-Cloud ecosystem.

Wellbeing

In addressing employee wellbeing, Datasumi can elevate its G-Cloud service provision by prioritizing initiatives that promote mental health, work-life balance, and overall employee wellness. By aligning with social value themes that emphasize wellbeing, Datasumi can contribute to creating a supportive and healthy work environment for its employees and clients. Drawing inspiration from leading companies that prioritize employee wellbeing, such as Microsoft's focus on mental health support and flexible work arrangements, Datasumi can implement similar programs to enhance the overall wellbeing of its workforce. By fostering a culture of mindfulness, resilience, and work-life balance, Datasumi can empower its employees to thrive both professionally and personally.

Furthermore, by incorporating features in its G-Cloud services that prioritize user experience, accessibility, and data privacy, Datasumi can contribute to the overall wellbeing of its clients. Ensuring that services are user-friendly, secure, and aligned with best practices in data protection can enhance the mental and emotional wellbeing of users who rely on these technologies for their daily operations. Additionally, by promoting digital wellness practices and providing resources for managing screen time and technology usage, Datasumi can support clients in maintaining a healthy relationship with technology.

By integrating these wellbeing-focused initiatives into its G-Cloud services and organizational culture, Datasumi can foster a holistic approach to wellbeing that benefits both its employees and clients. Prioritizing mental health support, work-life balance, user experience, and data privacy can create a positive impact on overall wellbeing within the workplace and the digital ecosystem at large.

Pricing

Price
£575 a unit a day
Discount for educational organisations
Yes
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at accounts@datasumi.com. Tell them what format you need. It will help if you say what assistive technology you use.