ExTrac
ExTrac is an open-source intelligence platform. It ingests the highest-relevance, expert-curated data streams, and uses AI to make sense of these at scale. ExTrac detects and maps risks in the physical world, online, and where the two intersect, alerting you so that you can get ahead of the threat.
Features
- Automated threat and risk event detection
- Customisable threat and risk alerts
- Threat and risk level forecasting
- Narrative, topic, and theme detection and modelling
- AI analyst co-pilot (co-analyst)
- Advanced data analytics capabilities
- Automated data visualisation tools
- Available via a secure web portal or API
- Bespoke threat and risk intelligence reporting
- Secure and compliant by design
Benefits
- Access high-relevance threat data, curated by human domain experts
- Receive live threat alerts about risks that your organisation faces
- Detect and track emerging risks via a real-time threat map
- Forecast future threat and risk levels
- Detect and model hostile strategic communications campaigns and narratives
- Leverage ExTrac's AI-powered intelligence ‘co-analyst’ to save time and resources
- Build custom threat intelligence dashboards to reflect unique risk profiles
- Expand data coverage based on your evolving requirements
Pricing
£36,000.00 a licence a year
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
4 4 4 1 1 1 5 8 8 7 5 8 5 1 1
Contact
EXTRAC AI LIMITED
Robert Basset
Telephone: 07771550277
Email: bertie@extrac.ai
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- No
- System requirements
- Nil
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Within 4 hours, often quicker
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Onsite support
- Support levels
- We have a dedicated customer success team that provides email, telephone and onsite support to our customers. The majority of training and ongoing support is done virtually as the platform is very intuitive to use, but onsite support is also provided as required at no cost if the location is within the UK and the requirement is reasonable.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- All ExTrac uses are provided with initial training and unlimited ongoing support from a named customer success representative. Training is provided virtually as standard, though can be conducted onsite if required.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- The platform does not use or store any user data
- End-of-contract process
- At the end of the contract, if access is no longer required by the user, their access permissions are removed.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- Besides offering a web application with a login page through a browser, users can interact with our service programmatically via an API. This involves making GET requests to the API endpoint using any programming language or through our provided web user interface.
- Accessibility standards
- None or don’t know
- Description of accessibility
- Users can create dashboards to view and download our data, including text, images, and videos. Additionally, a read-only API allows data retrieval by providing input parameters (filters) and specifying desired output content. Note that users cannot modify the data, ensuring the integrity of the original information.
- Accessibility testing
- Testing is not conducted at this stage.
- API
- Yes
- What users can and can't do using the API
-
Users can obtain an API key by contacting info@extrac.ai. The API operates as a read-only service, meaning users cannot make changes to the data. Users can request data from the service by providing input parameters and specifying desired output content.
There are limitations to what users can do through the API, which are determined based on the account's specifications at the time of key request. These limitations may include monthly quotas for data retrieval from specific endpoints, restrictions on accessed data types, and limits on the volume of data fetched per request. If users need to adjust these limits, they may contact us directly. - API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- ExTrac offers customizable contracts that allow clients to request tailored threat and risk coverage. They can access specific system components, obtain particular data coverage or types, or receive our service through a single method—whether via an API, web application, or reports delivered by email or other tools.
Scaling
- Independence of resources
- ExTrac's data hosting and compute infrastructures has been designed with scalability in mind and can be dynamically adjusted based on levels of platform usage.
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- No user data is held in the platform.
- Data export formats
- Other
- Other data export formats
- Users do not export data
- Data import formats
- Other
- Other data import formats
- Users do not import any data
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- The standard ExTrac Service Level Agreement commits that ExTrac will use all reasonable endeavours to ensure that the uptime of cloud services is at least 99% during each calendar month. ExTrac commtis to clients that, for any working day where services are unavailable for 25% of the workday or more, one full day will be credited to the Contract term. A working day is defined as 0900-1700 based on the time zone of the jurisdiction where the Contract is held. An outage is defined as one or more core platform capabilities being unavailable.
- Approach to resilience
- ExTrac leverages an ephemeral, auto-healing infrastructure with a strong focus on resilience. We utilize Terraform to manage our infrastructure as version-controlled code, enabling us to recreate the entire environment within hours if necessary. For backend and API services, we rely on Kubernetes, which ensures high uptime, automated scaling, and self-healing capabilities. This combination of tools allows us to maintain a robust, fault-tolerant service that swiftly adapts to challenges and minimizes downtime.
- Outage reporting
- ExTrac utilizes Incident.io to maintain a status page that provides real-time system updates internally and can be shared with customers. Additionally, ExTrac offers an email alerting system to keep active users informed about outages and their resolutions, ensuring that they receive timely updates and maintain visibility into the service's operational status.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- User Management in the SaaS product is restricted to the ExTrac Organisation, wherein only select users are granted Administrator Access.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- No audit information available
- Access to supplier activity audit information
- You control when users can access audit information
- How long supplier audit data is stored for
- Between 1 month and 6 months
- How long system logs are stored for
- Between 1 month and 6 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- ExTrac holds Cyber Essentials Plus certification.
- Information security policies and processes
- ExTrac operates according to a documented cyber, data, and information security policy that is reviewed every six months or on an ad hoc basis following changes to system architecture or regulations in any of the jurisdictions where ExTrac operates. All ExTrac team members receive training on this policy as part of onboarding, including training on the identification of the full range of cyber and information threats, and are required to complete refresher training on an annual basis. The policy covers information classification and handling, password management procedures, management and security of individual IT devices, regulation of the use of removable media, regulation of the use of authorised software and applications, erasure of systems and safe disposal of IT assets, information security incident response procedures, acceptable use of social media, and identification of insider threats. Adherence to ExTrac policies is monitored by individual line managers with the oversight of the IT department and the executive team.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
Any changes to services, features or infrastructure relating to the production release of the SaaS platform are put through the following processes:
1. Change request raised via our internal task management system.
2. Request moved to triage and discussed with internal stakeholders.
3. If approved, engineering tasks are created, approved and scheduled.
4. A detailed record of changes made are tracked via tasking software and their related code Pull Requests. - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- Assessment: (a) Vulnerability assessments are conducted on all software products and systems; (b) these assessments include automated scanning tools, internal manual testing, and external audits; (c) The assessments are performed by certified personnel or third-party experts. Information: Threat data is drawn from up to date vulnerability testing software, leveraging systems such as VulnHub & OWASP. Patching: (a) critical patches are prioritised for immediate deployment and applied within 48 hours; (b) non-critical patches and updates are applied within 14 days.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
ExTrac implements a range of proactive security measures to ensure the security and integrity of our systems, including AWS Web Application Firewall. ExTrac also leverages monitoring and observability toolings to proactively monitor our API and AWS Cloud Front service logs for potential compromises.
The ExTrac incident response policy requires that all critical security-related incidents receive an immediate response, and are prioritised over all other activities. Non-critical incidents are dynamically prioritised, with the majority of incidents receiving a response within two business days. - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- ExTrac operates a documented Incident Response Protocol which details processes for declaring, classifying, escalating, communicating, and learning from security and engineering incidents. This is managed via the incident.io platform. Incidents can be declared by either internal stakeholders or users (via email or phone with the ExTrac Customer Success team). Following declaration of an incident, a response team is immediately identified, the impact evaluated, and a plan put in place for communicating updates to the user base. Regular updates are provided to users until the incident is resolved. After-action reports are produced for every incident and lessons learned are shared internally.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Tackling economic inequalityTackling economic inequality
ExTrac is committed to promoting economic equality. Central to our approach is the use of flexible working policies to promote geographically diverse employment opportunities in the artificial intelligence and research sectors. In this way, we have created new and high-paying positions for individuals residing outside of London, supporting economic growth in regions with fewer economic opportunities, and contributing to more demographically balanced development. Additionally, ExTrac has taken a proactive stance to supporting development of high-value skills such as coding and data science, particularly amongst underrepresented groups including veterans. At the time of writing over 10% of ExTrac employees were veterans. Through our learning and development and mentoring programmes we aim to support individual career prospects and contribute to efforts to narrow the skills gap in the UK's workforce, further promoting economic equality and inclusivity.
Pricing
- Price
- £36,000.00 a licence a year
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- It is possible to conduct an 2 month unpaid trial of the ExTrac SaaS solution for 1 - 5 licences by agreement