Skip to main content

Help us improve the Digital Marketplace - send your feedback

Legalytics Ltd

Artificial Intelligence (AI) & Data Cloud Solutions

Legalytics is an AI & Cloud focused solution, consulting and data experts. Leveraging data,
technology, business intelligence, analytics and creativity, we analyse the quality and value of
data and touchpoints to help companies succeed in achieving their strategic goals.

Features

  • Machine Learning & Artificial Intelligence capabilities
  • Hybrid Cloud Solutions
  • Real- Time Big Data Analytics for Legal and law firms
  • Business Intelligence & Data Warehouse for public sector, legal, banking

Benefits

  • Real-time data centric solution - master data
  • Seamless interface with business critical applications
  • Real time AI powered information

Pricing

£600 to £1,000 a person a day

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at ashok@legalytics.io. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

4 6 8 7 8 8 4 7 2 4 7 8 7 9 9

Contact

Legalytics Ltd Ashok Panchabakesan
Telephone: 07912939156
Email: ashok@legalytics.io

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints
No constraints
System requirements
  • Operating systems
  • Infrastructure requirement such a virutal machine
  • Software licences can be depends on additional services

User support

Email or online ticketing support
Yes, at extra cost
Support response times
We provide 24x7 support at extra cost however weekend may take longer to response
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Urgent and Non urgent support level provided. We provide technical onward for end to end client delivery and have share support model for all live clients.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Software as a service and customisation based on the requirement. This is from Kick off session to onboarding their process, data, user onsite training and user / handover documentation.
Service documentation
Yes
Documentation formats
ODF
End-of-contract data extraction
Extract methods will be agreed in the contract with client since this varies based upon client requirement.
End-of-contract process
It depend s upon the requirement for Cloud Software. We deploy and handover all the solution without any additional cost for this service. However if additional BAU support requires at the end of the contract then additional
charges may apply.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Chrome
Application to install
Yes
Compatible operating systems
Windows
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Our solution based upon responsive design hence it works on mobile and desktop.
Service interface
No
User support accessibility
None or don’t know
API
Yes
What users can and can't do using the API
Its a self service platform leveraging Swagger UI based REST API. User can make changes by invoking the API using industry standard API toolsets. API provides fairly all commonly used capabilities
API documentation
No
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
1. Data Feeds
2. User Interface
3. Business Rules
4. Visualisation
5. Reporting

Scaling

Independence of resources
Our service is fully load balancing and scale up and down based upon the user demand. We take every step to prevent one user impacting other user using the same server.

Analytics

Service usage metrics
Yes
Metrics types
Cloud Predictive & Analytics solutions
Reporting types
  • Real-time dashboards
  • Reports on request

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Microsoft, IBM, Google, AWS services to support our core technology

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
In-house
Protecting data at rest
Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Data is available within our platform/solution which can be accessed via various technology tools. Export option is available in visualisation platform
Data export formats
  • CSV
  • Other
Other data export formats
XML
Data import formats
  • CSV
  • Other
Other data import formats
XML

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
SLA varies based upon the environment and requirements of each customer. We aim to provide 95% availability for test environment and 99% availability for production environment.
Approach to resilience
This information is available on request.
Outage reporting
Notification platform has been build in this order. 1. Email Notification 2. API flag to confirm if services are down / outages 3. Dashboard - which can display message regarding outages.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels
It will be persona driven restrict access by on different interfaces and portal applications.
Access restriction testing frequency
At least once a year
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
Practices / standard for security governance. 1. Take a holistic approach to strategy 2. Create awareness and training throughout the organisation. 3. Monitor and measure 4. Establish open communication between all
stakeholders 5. Promote agility and adaptability
Information security policies and processes
The primary information security policy is issued by the company to ensure that all employees who use information technology assets within the breadth of the organization, or its networks, comply with its stated rules and guidelines.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
1. Assess the Scope of the Change i.e. how big is this change including people and process effects? 2. Assess the Readiness of the Organization Impacted by the Change. 3. Effective Communication 4. Sponsor Activities and Sponsor Roadmaps 5. Change Management Training for Managers 6. Training Development and Delivery 7. Employee Feedback and Corrective Action
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
This above 3 process managed and control by third party services and Supplier-defined controls by our internal development dashboard to see the logs.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
We have incident dashboard which is constantly monitored by team.
Incident management type
Supplier-defined controls
Incident management approach
Pre-defined processed and controlled by user reporting / ticketing process for any incidents.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

Covid-19 recovery

Covid-19 recovery

Our solution will enable the government and clients to recover from the economic downturn and support the recovery of the country

Pricing

Price
£600 to £1,000 a person a day
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
One day workshop with client including limited R&D based on complexity and terms and condition.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at ashok@legalytics.io. Tell them what format you need. It will help if you say what assistive technology you use.