Generative AI for Enterprise with Amazon Q
Datasumi elevates your business by leveraging the power of generative artificial intelligence (AI) through Amazon Q Business. Our all-encompassing training and consulting service, Q Insights, is committed to assisting you in realising the complete value of this innovative technology.
Features
- Tailored team training sessions
- Custom Amazon Q Business solution
- Dedicated access to AI experts
- Comprehensive training program
- Seamless integration with existing systems
- Ongoing support and guidance
- Customized consulting services
- Cutting-edge technology access
- Dedicated project management
- Flexible training options
Benefits
- Automate repetitive tasks
- Actionable insights generation
- Personalised customer experiences
- Boosted productivity and reduced workload
- Competitive advantage with AI technology
- Business growth and revenue increase
- Improved collaboration and communication
- Enhanced customer satisfaction and retention
- Reduced costs associated with manual tasks
- Increased transparency and accountability in government operations.
Pricing
£575 a unit a day
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
4 1 8 7 5 8 9 7 0 9 0 2 6 3 3
Contact
DATASUMI LTD
Datasumi Team
Telephone: +442045770319
Email: accounts@datasumi.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- Datasumi's service is an extension to Amazon Web Services (AWS), specifically Amazon Q Business.By integrating with existing enterprise systems and workflows, Datasumi's service helps businesses streamline their operations, automate repetitive tasks.
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- Before using our service, please note the following constraints that may affect your experience. We require access to specific technical resources, such as AWS accounts and data sources, for proper functioning. Ensure you have these resources in place beforehand. While we strive for customisation, there may be limitations due to technical or resource constraints. We prioritise data privacy and security; review our policies and procedures to ensure compliance with your requirements. Our service is subject to availability, and not all requests can be accommodated instantly. Finally, consider your budget and potential ROI before engaging with us.
- System requirements
- AWS
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Same day
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web chat accessibility testing
- Webchat, We support assistive technology users through Zendesk.
- Onsite support
- Yes, at extra cost
- Support levels
- Support needs are meticulously assessed and aligned with the client's unique business requirements. This involves a comprehensive analysis of operational demands, challenges, and objectives to tailor support services effectively. By harmonizing support needs with business goals, a personalized support plan is developed to address specific requirements and ensure peak performance. Collaborative discussions and industry understanding lead to support agreements that meet expectations and enhance operational efficiency. This strategic approach aligns support services with the client's overarching business strategy, fostering a partnership focused on effectively meeting their needs. Integrating client input and business insights into the support planning process establishes a tailored support framework that offers precise assistance and solutions in line with the client's vision and objectives.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
We recognize that introducing a new service can be daunting, so we provide extensive support to ensure a smooth transition. Our goal is to enable users to quickly and effectively leverage the benefits of our service.
To get started, our dedicated team assists with account setup, environment configuration, and data source integration. We also offer step-by-step guides and tutorials to navigate our intuitive interface.
For more in-depth guidance, we provide various training options: onsite training sessions for large-scale implementations, online training programs featuring video tutorials, interactive simulations, and live webinars. Additionally, our comprehensive user documentation includes guides, FAQs, and knowledge base articles, available 24/7.
Once users are up and running, our dedicated support team is available via phone, email, or chat to address any questions, concerns, or issues. We also maintain an active community forum where users can share knowledge, ask questions, and receive feedback from our experts and other users. - Service documentation
- Yes
- Documentation formats
- HTML
- End-of-contract data extraction
-
We prioritize data ownership and understand its importance for our customers. To guarantee a seamless transition at the end of our contract, we have developed a user-friendly data extraction process.
Our dedicated support team will notify users 30 days before the contract expiration date with instructions on how to extract their data. Upon notification, users can access a secure portal where they can download their stored data in a format of their choice (e.g., CSV, JSON).
Our team is committed to assisting users in exporting their data, ensuring that all relevant information is extracted and made available for future use. We also provide dedicated support during the data extraction process to address any questions or concerns.
To further aid our customers, we offer detailed documentation on the data export process, including step-by-step guides and FAQs. Additionally, our support team is available at any time to provide assistance with data extraction. - End-of-contract process
-
End of Contract
At the end of our contract, we ensure a smooth transition for our customers by providing a comprehensive data extraction process. This allows users to retain ownership of their data and easily move to new solutions.
What's Included in the Price
Our contract price includes access to our platform with all its features and functionalities, ongoing support from our dedicated team, regular software updates and maintenance, and data storage and processing capabilities.
Additional Costs
In addition to the base price, there may be extra costs for certain services or features. These include custom development or customization of our platform to meet specific user requirements (additional fee), additional data storage or processing beyond what is included in the contract (additional fee), and priority support for urgent issues (additional fee).
Please note that all prices and fees are subject to change, and we will communicate any changes clearly to users before they take effect. We strive to be transparent about our pricing and ensure that our customers understand what they can expect when signing up for our services.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- The chat/chatbot uses the full screen.
- Service interface
- No
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- API
- No
- Customisation available
- Yes
- Description of customisation
- Our service allows users to customise their experience through various options. Users can choose from different architecture templates or design a custom one with our experts. They can also integrate preferred data sources, select report types and visualisations, and set up custom notifications. Customisation can be done through our user-friendly interface, with the help of our experts, or by integrating with other tools. Authorized administrators, technical experts, and business analysts can all customise the service to meet their specific needs. This level of customisation empowers users to achieve desired outcomes from our service.
Scaling
- Independence of resources
- We ensure independence of resources through several strategies. Resource isolation uses a multi-tenant architecture to separate each user's data and performance from others. Scalability allows us to add resources as needed to meet increased demand, handling sudden spikes without impacting individual users. Priority queues prioritize critical requests for efficient processing during high demand. Monitoring systems track service performance and alert our team to potential issues before they impact users. Regular maintenance ensures the system remains efficient and responsive. By employing these strategies, we guarantee a seamless experience for all users, regardless of demand.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Datasumi's service metrics encompass detailed data on inbound and outbound usage, including inquiry volumes, customer journey insights, and chat durations. The secure online portal offers real-time dashboards, regular reports, and on-demand reports, providing valuable performance insights. Users can export service usage metrics in CSV, XML, and JSON formats. Additionally, Datasumi's services support various data export methods such as APIs, user interface exports (Excel, CSV, JSON, XML), data integration platforms, and database migration tools. These approaches enable structured and efficient data export, empowering users with actionable insights for decision-making and strategic planning.
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- Never
- Protecting data at rest
- Other
- Other data at rest protection approach
- Within your Cloud framework.
- Data sanitisation process
- No
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
-
Our approach ensures that users can retrieve their data in the format they need.
Step-by-Step Process
Notification: 30 days before contract expiration, our dedicated support team will notify users and guide them through the data export process.
Data Access: Users gain secure access to a portal where they can download their stored data in various formats (CSV, JSON).
Customization: Users can choose from pre-defined templates or create custom exports tailored to their specific requirements.
Verification: Our support team verifies the export process to ensure all relevant data is extracted and made available for future use. - Data export formats
-
- CSV
- ODF
- Other
- Other data export formats
-
- XML
- JSON
- Excel
- Data import formats
-
- CSV
- ODF
- Other
- Other data import formats
-
- XML
- JSON
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- No guaranteed SLA.
- Approach to resilience
-
Our datacenter setup is designed for maximum resilience, ensuring uninterrupted service and business continuity. We employ a multi-datacenter strategy, replicating critical components across multiple geographic locations. This redundancy enables seamless failover in the event of an issue at one datacenter, minimizing downtime and ensuring continuous availability.
Enhancing Resilience
To further strengthen our infrastructure, we implement additional resilience measures:
Redundant hardware and networking infrastructure
Load balancing and traffic management systems to optimize resource allocation
Regular backups and disaster recovery processes for data protection
Monitoring and alerting systems to detect potential issues before they impact service
Resilience Benefits
Our resilient design yields numerous benefits, including:
Improved uptime and availability
Reduced risk of data loss or corruption
Enhanced business continuity and disaster recovery capabilities
Increased customer trust and satisfaction
While we are happy to provide general information about our resilience measures, the specific details of our datacenter setup are available upon request. We prioritize transparency in building trust with our customers and ensuring their confidence in our services.
Note
Please note that this information is subject to change and may be updated as needed to reflect changes in our infrastructure or service offerings. - Outage reporting
-
We provide multiple channels for reporting outages:
**Public Dashboard**: Our public dashboard provides a real-time overview of the service status, including any ongoing outages or maintenance activities. The dashboard is available at [insert URL].
**API**: We offer an API that allows developers to retrieve information about the service status, including outage notifications and details. The API can be accessed at [insert URL].
**Email Alerts**: Our system sends automated email alerts to users who have opted-in to receive notifications when there is a planned or unplanned outage. Users can opt-out of these emails at any time.
**Additional Communication Channels**: In addition to our public dashboard, API, and email alerts, we also communicate with users through:
* Support portal: Our support team is available 24/7 to answer questions and provide assistance during outages.
**Outage Notification Process**: When an outage occurs, our system automatically triggers a notification process that sends alerts to our users through the channels mentioned above. We also have a dedicated team that monitors the service status and provides updates on the resolution progress.
By providing multiple channels for reporting outages, we ensure that our users are informed and can plan accordingly during any downtime.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Access restrictions in management interfaces and support channels
- Microsoft account id and password or AWS IAM
- Access restriction testing frequency
- Never
- Management access authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- Less than 1 month
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
-
- AWS cloud platform PCI Certification
- Azure cloud platform PCI Certification
- GCP cloud platform PCI Certification
Security governance
- Named board-level person responsible for service security
- No
- Security governance certified
- No
- Security governance approach
- Use IAM sign-on for security - single sign-on. In other word, security is outsourced to Cloud Provider.
- Information security policies and processes
-
Policies and Procedures
Our information security framework includes:
Information Classification Policy: governing the handling, storage, and sharing of sensitive information
Access Control Policy: controlling access to systems, networks, and data
Data Protection Policy: outlining procedures for encrypting, backing up, and recovering user data
Incident Response Policy: guiding response efforts in the event of a security incident
Reporting Structure
Our Information Security Officer (ISO) reports directly to our Chief Technology Officer (CTO) and is responsible for:
Developing and implementing information security policies and processes
Conducting regular security audits and risk assessments
Providing training and awareness programs for employees on information security best practices
Ensuring Policy Compliance
We ensure policy compliance through:
Mandatory annual training for all employees on our information security policies and processes
Regular awareness programs and campaigns to educate employees on information security best practices
Ongoing compliance monitoring by our ISO to identify areas for improvement
Incident response efforts led by our ISO in the event of a security incident
Additional Security Measures
To further enhance our information security, we implement:
Robust access controls, including multi-factor authentication and role-based access control
Regular vulnerability assessments and penetration testing
Encryption in transit and at rest
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Our processes track components throughout their lifecycle and assess changes for potential security impact.
We assign unique identifiers to each component, tracking its design, development, deployment, and retirement in a centralized repository. Changes are assessed against our Security Policy and regulations, evaluating affected components, dependencies, and potential risks.
Approved changes are implemented using automated tools, verified by our Quality Assurance team to ensure proper configuration and no new security vulnerabilities. Post-implementation testing verifies that the change did not compromise service security or introduce new risks.
Our configuration and change management processes guarantee secure, reliable services that comply with relevant regulations. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
We proactively identify, assess, and remediate potential threats to our services through a comprehensive vulnerability management process.
We continuously monitor for vulnerabilities from various sources, including national databases, industry reports, internal monitoring, and threat intelligence feeds. Our team assesses the severity and impact of each potential threat, considering factors like likelihood of exploitation, potential damage, and patch availability.
Once identified, we prioritize remediation based on severity and impact. We deploy patches quickly, following a standardized process: assessment, testing, and deployment to production. Information sources include national databases, industry reports, internal monitoring, and collaboration with other organizations. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
We employ a proactive and comprehensive protective monitoring approach to detect and respond to potential security threats in real-time.
We use advanced threat detection technologies, including anomaly-based systems, signature-based systems, and behavioral analysis tools. Our monitoring capabilities include network traffic analysis, system log analysis, and endpoint monitoring.
When a potential compromise is identified, we respond quickly using our incident response process. Our team assesses the situation, contains the threat, and eradicates malware or malicious code. We also conduct post-incident analysis to identify root causes and implement preventative measures. - Incident management type
- Supplier-defined controls
- Incident management approach
- Our incident management processes are fully facilitated by our Cloud Provider. We have pre-defined processes for common events, ensuring swift and effective responses to incidents. Users report incidents through the designated channels provided by our Cloud Provider. Incident reports and updates are communicated through the tools and systems offered by our Cloud Provider. By leveraging the resources and expertise of our Cloud Provider, Datasumi maintains a structured incident management framework to promptly address and resolve any security issues or disruptions that may arise.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
In combating climate change, Datasumi can elevate its G-Cloud service provision by embracing sustainability initiatives and bolstering environmental resilience. Taking cues from Google Cloud's ambitious targets of operating solely on renewable energy and aiming for 24/7 carbon-free energy by 2030, Datasumi can set similar benchmarks to curtail its carbon footprint and champion sustainable practices across its operations. By harnessing technology to bolster sustainability endeavors and democratizing earth-centric data for informed decision-making, Datasumi can empower organizations to make data-informed choices that bolster climate resilience. Moreover, aligning with social value themes centered on responsible consumption and production, as delineated in the Social Value Model, can underscore Datasumi's dedication to environmental stewardship and sustainability within its service offerings.
By integrating these strategies into its G-Cloud services, Datasumi not only actively contributes to the global battle against climate change but also fosters a more sustainable future. Through a concerted focus on renewable energy adoption, carbon footprint reduction, and promoting eco-conscious practices, Datasumi can position itself as a leader in environmentally responsible service provision. By aligning with sustainability goals and leveraging technology for positive environmental impact, Datasumi can play a pivotal role in advancing climate action and fostering a greener, more sustainable digital landscape.Tackling economic inequality
In addressing economic inequality through its G-Cloud service provision, Datasumi can focus on initiatives that promote equal access to economic opportunities, support small and medium-sized enterprises (SMEs), and foster diversity within the supply chain. By aligning with social value themes that aim to reduce economic disparities, Datasumi can contribute to creating a more inclusive and equitable business environment. Drawing inspiration from the Social Value Model's emphasis on creating new businesses, jobs, and skills, Datasumi can implement programs that facilitate entrepreneurship, job creation, and skills development for underrepresented groups. Additionally, by supporting educational attainment relevant to contracts, providing training schemes to address skills gaps, and promoting sector-related skills growth, Datasumi can help bridge the economic divide and empower individuals from diverse backgrounds.
Furthermore, by structuring supply chain selection processes to ensure fairness and diversity, encouraging innovation and disruptive technologies, and promoting collaboration throughout the supply chain, Datasumi can actively contribute to reducing economic inequality. Embracing scalable methods for modernizing delivery, supporting apprenticeships and industry placements, and fostering a fair and responsible approach to working with supply chain partners can further enhance economic inclusivity within its service provision. By adopting these strategies and aligning with initiatives that prioritize economic equality, Datasumi can play a pivotal role in fostering a more level playing field for businesses of all sizes and backgrounds within the G-Cloud ecosystem.Equal opportunity
In the context of equal opportunity, Datasumi enhances its G-Cloud service provision by focusing on promoting diversity, inclusion, and equitable access to opportunities. By aligning with social value themes that prioritize equal opportunities, Datasumi can contribute to fostering a more inclusive and fair society. Drawing inspiration from the Social Value Model's emphasis on supporting local communities in managing and recovering from the impact of COVID-19, Datasumi can implement initiatives that facilitate employment opportunities, re-training programs, and workforce diversity. Additionally, by actively engaging in activities that promote equal access to resources, education, and employment opportunities, Datasumi can demonstrate its commitment to social responsibility and equitable practices within its service provision. Through a concerted effort to prioritize equal opportunity initiatives, Datasumi can play a significant role in advancing social equity and inclusivity within the G-Cloud ecosystem.Wellbeing
In addressing employee wellbeing, Datasumi can elevate its G-Cloud service provision by prioritizing initiatives that promote mental health, work-life balance, and overall employee wellness. By aligning with social value themes that emphasize wellbeing, Datasumi can contribute to creating a supportive and healthy work environment for its employees and clients. Drawing inspiration from leading companies that prioritize employee wellbeing, such as Microsoft's focus on mental health support and flexible work arrangements, Datasumi can implement similar programs to enhance the overall wellbeing of its workforce. By fostering a culture of mindfulness, resilience, and work-life balance, Datasumi can empower its employees to thrive both professionally and personally.
Furthermore, by incorporating features in its G-Cloud services that prioritize user experience, accessibility, and data privacy, Datasumi can contribute to the overall wellbeing of its clients. Ensuring that services are user-friendly, secure, and aligned with best practices in data protection can enhance the mental and emotional wellbeing of users who rely on these technologies for their daily operations. Additionally, by promoting digital wellness practices and providing resources for managing screen time and technology usage, Datasumi can support clients in maintaining a healthy relationship with technology.
By integrating these wellbeing-focused initiatives into its G-Cloud services and organizational culture, Datasumi can foster a holistic approach to wellbeing that benefits both its employees and clients. Prioritizing mental health support, work-life balance, user experience, and data privacy can create a positive impact on overall wellbeing within the workplace and the digital ecosystem at large.
Pricing
- Price
- £575 a unit a day
- Discount for educational organisations
- Yes
- Free trial available
- No