BDB Data Analytics as a Service Platform
DAaS is an AI based end-to-end BI and Data Analytics Platform. It has Big Data Pipeline, Data Preparation, ETL, Data lineage, Predictive (Python, Neural Networks), Deep Learning Workbench, Self-service BI, AI-driven Search, and Governed Dashboards on Cloud, On-premises and can connect with any Structured, Unstructured, IOT, Social Media data Sources.
Features
- Cloud Agnostic
- Scalability: built for growth in data volume and users.
- Data Storage / Lake Agnostic
- Data Ingestion
- Data Democratization
- Generative AI as Assist (LLMs/SLMs Integration)
Benefits
- Advanced Analytics: data-driven decision-making, boosting profitability
- Encryption for protecting sensitive data, ensuring compliance
- Scalability and Accessibility with secure, cloud-based access
- Quantifiable efficiency, cost savings, revenue growth, and risk reduction
- Streamline operations, reduce risks, optimize resource allocation for savings
Pricing
£300.00 a unit a month
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
4 8 0 9 7 2 0 7 5 5 5 2 4 3 0
Contact
RCUBE LABS LTD
Rajmohan E.K
Telephone: +447918197847
Email: rajmohan.ek@rcubelabs.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- No
- System requirements
-
- Hardware: Memory, Storage, Cloud
- Operating System: Windows, Linux, macOS, iOS, Android.
- Software Dependencies: Libraries, frameworks, runtime environments.
- Network Connectivity: Bandwidth, latency, reliability.
- Data Backup and Recovery.
- Compliance and Governance: Auditing, logging, reporting for compliance.
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Business Hours usually. Weekend support can be provided at extra cost
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
We provide L1, L2 and L3 Support
L1: Support includes activities like basic troubleshooting, account creation, guiding the usage of self-service capability, the first point of contact, etc.
L2: Support includes activities like in-depth technical support for the resolution of an incident that cannot be resolved by the L1 team. It does not include any application code changes or release-related updates.
L3: Support includes activities like changes in the application code for the resolution of an incident. The L3 support also takes care of the bug fixes & proactive analysis of incidents.
A service Operations manager responsible for day-to-day operations will be assigned to each account
Priority vs Response/Fix Targets are as follows -
Incident Response time - 4h for P1, 8h for P2 and P3, 16 h for P4
Incident Resolution time - 8h for P1, 16h for P2, 32h for P3, 48 h for P4 - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Onsite/Offsite, custom, classroom product training , User Documentation.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- Other
- Other documentation formats
- Video
- End-of-contract data extraction
- When a contract ends, users can export their data by exporting workbooks, downloading data dumps, exporting data extracts, accessing databases directly, or using third-party integration tools.
- End-of-contract process
- BDB will support and facilitate the buyer in extracting all their data at the end of the contract. Any additional service will be charged extra.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- On Desktop, Using Web Browser users with different access levels, like Admin, Datascientist, Data Engineers can work based on the respective accesses and viewers can view the reports/Dashboards. Mobile App is for Viewing the Reports/Dashboards only.
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- Description of service interface
- The Platform has a Web based interface with Drag n Drop functionality
- Accessibility standards
- None or don’t know
- Description of accessibility
- BDB Platform can be accessed through any of the certified browser
- Accessibility testing
- None
- API
- Yes
- What users can and can't do using the API
- Users can Publish Data as an API for 3rd party consumption and Model as API.
- API documentation
- Yes
- API documentation formats
- HTML
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
- All the standard components can be reused across different use cases, BDB Platform provides an extensibility feature where the user will be able to create custom components. BDB Platform provides the following options: BDB Pipeline provides provisions to create a custom component and deploy it. BDB DS Lab enables the user to write the custom script and use it in the Data Science model. BDB Governed Dashboard provides an option to write java scripts to achieve customization.
Scaling
- Independence of resources
- The BDB Platform is deployed on Kubernetes and based on microservice architecture. Kubernetes allows the auto-scaling if it is enabled while deploying the platform
Analytics
- Service usage metrics
- Yes
- Metrics types
- Yes, all interaction on BDB Platform are via API. These API's have interceptors which tracks and logs all the interactions like user logins, dashboard accessed, data sources accessed, modification in reports/dashboard etc
- Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- BDB Reports/Dashboards supports export option in different formats (csv,xlsx,pdf,ppt)
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- Xlsx
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- Xlsx
- JSON
- Google sheet
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- The availability of our services is dependent on the cloud services on which our platform is hosted.
- Approach to resilience
- BDB is hosted on cloud service providers like AWS, Azure, GCP etc on which the platform is reliant for resilience
- Outage reporting
- Our service reports outages through email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Other
- Other user authentication
-
SAML
3rd Party Authentication – e.g., Octa, OAuth, CAPPM, LDAP, etc. - Access restrictions in management interfaces and support channels
-
Role-Based Access Control (RBAC) is implemented to restrict access to management interfaces and support channels based on predefined roles and permissions. These roles, including administrator, manager, and support staff, are assigned with appropriate levels of access.
User Management – User managements comes an entire module inside BDB module where admin can manage various permissions, restrictions related to user & user group. Any user or user group can be assigned or restricted to use various other plug-ins & features of platform. In addition, custom field settings can be created & mapped with the user & user group properties. - Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Username or password
- Other
- Description of management access authentication
-
SAML
3rd Party Authentication – e.g., Octa, OAuth, CAPPM, LDAP, etc.
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
We have documented Information Security policies and standards in place. These documents outline our organization's approach to safeguarding sensitive information and data, ensuring the confidentiality, integrity, and availability of our systems and information assets. Our Information Security policies and standards cover various aspects of security, including but not limited to:
Access Control: Policies and procedures governing user access to systems and data.
Data Classification: Guidelines for categorizing and protecting data based on its sensitivity.
Incident Response: Procedures for detecting, reporting, and responding to security incidents.
Network Security: Standards for securing our network infrastructure, including firewalls, intrusion detection/prevention, and encryption.
Password Management: Guidelines for creating and managing secure passwords
Acceptable Use: Rules and expectations for the appropriate use of company resources, including computers and networks.
Encryption: Policies on encrypting sensitive data in transit and at rest.
Physical Security: Measures to protect physical access to data centers and sensitive areas.
Vendor Management: Requirements for evaluating and managing security risks associated with third-party vendors.
Employee Training and Awareness: Initiatives to educate employees about security best practices and their roles in maintaining security.
These policies and standards are regularly reviewed and updated to adapt to changing threats and technologies.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- BDB Platform has the inbuilt capability of VCS (Version Control System) for keeping track of the changes. In BDB Data Center, under Data Set and Data Store, we have options for Push to VCS (Export to VCS) & Pull from VCS (import from VCS) options are present to import/Export cube/dataset from VCS to keep track of the changes.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
BDB has a robust process for releasing patches & configuration updates to address security issues for the BDB Pltform.
Here's a simplified overview of the process:
• Identify vulnerabilities through internal testing, external reports, or threat intel.
• Assess & prioritize vulnerabilities based on severity & potential impact.
• Develop & test patches or fixes.
• Deploy patches & updates, either manually or auto.
• Verify effectiveness.
• Document everything.
• Continuously monitor & update process to stay secure.
BDB promptly addresses security issues & communicates clearly with customers throughout the process. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
Our Business Impact Analysis (BIA) is a comprehensive process that identifies a wide range of business interruption risks and evaluates the potential impact of various outage scenarios. We understand the importance of assessing risks comprehensively to ensure the resilience of our operations. Here's how our BIA addresses these aspects:
1. Identification of Business Interruption Risks
2. Range of Outagesdurations and severities of outages.
3. High-Risk Applications
4. Evaluation of Impact
5. Risk Mitigation Strategies - Incident management type
- Supplier-defined controls
- Incident management approach
-
Identification and logging of security incidents.
- Classification of incidents based on severity and impact.
- Assigning appropriate resources to investigate and resolve incidents.
- Implementing containment and mitigation measures to minimize impact.
- Documenting and analyzing incidents to prevent recurrence and improve incident response capabilities.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Equal opportunity
- Wellbeing
Equal opportunity
BDB is an equal opportunity employer and it believes in providing equal employment opportunities to all.Wellbeing
Our policies reflect our commitment to the wellbeing of our employees.
Pricing
- Price
- £300.00 a unit a month
- Discount for educational organisations
- Yes
- Free trial available
- No