Skip to main content

Help us improve the Digital Marketplace - send your feedback

RCUBE LABS LTD

BDB Data Analytics as a Service Platform

DAaS is an AI based end-to-end BI and Data Analytics Platform. It has Big Data Pipeline, Data Preparation, ETL, Data lineage, Predictive (Python, Neural Networks), Deep Learning Workbench, Self-service BI, AI-driven Search, and Governed Dashboards on Cloud, On-premises and can connect with any Structured, Unstructured, IOT, Social Media data Sources.

Features

  • Cloud Agnostic
  • Scalability: built for growth in data volume and users.
  • Data Storage / Lake Agnostic
  • Data Ingestion
  • Data Democratization
  • Generative AI as Assist (LLMs/SLMs Integration)

Benefits

  • Advanced Analytics: data-driven decision-making, boosting profitability
  • Encryption for protecting sensitive data, ensuring compliance
  • Scalability and Accessibility with secure, cloud-based access
  • Quantifiable efficiency, cost savings, revenue growth, and risk reduction
  • Streamline operations, reduce risks, optimize resource allocation for savings

Pricing

£300.00 a unit a month

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at rajmohan.ek@rcubelabs.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

4 8 0 9 7 2 0 7 5 5 5 2 4 3 0

Contact

RCUBE LABS LTD Rajmohan E.K
Telephone: +447918197847
Email: rajmohan.ek@rcubelabs.com

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints
No
System requirements
  • Hardware: Memory, Storage, Cloud
  • Operating System: Windows, Linux, macOS, iOS, Android.
  • Software Dependencies: Libraries, frameworks, runtime environments.
  • Network Connectivity: Bandwidth, latency, reliability.
  • Data Backup and Recovery.
  • Compliance and Governance: Auditing, logging, reporting for compliance.

User support

Email or online ticketing support
Email or online ticketing
Support response times
Business Hours usually. Weekend support can be provided at extra cost
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
We provide L1, L2 and L3 Support
L1: Support includes activities like basic troubleshooting, account creation, guiding the usage of self-service capability, the first point of contact, etc.
L2: Support includes activities like in-depth technical support for the resolution of an incident that cannot be resolved by the L1 team. It does not include any application code changes or release-related updates.

L3: Support includes activities like changes in the application code for the resolution of an incident. The L3 support also takes care of the bug fixes & proactive analysis of incidents.

A service Operations manager responsible for day-to-day operations will be assigned to each account

Priority vs Response/Fix Targets are as follows -
Incident Response time - 4h for P1, 8h for P2 and P3, 16 h for P4
Incident Resolution time - 8h for P1, 16h for P2, 32h for P3, 48 h for P4
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Onsite/Offsite, custom, classroom product training , User Documentation.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
  • Other
Other documentation formats
Video
End-of-contract data extraction
When a contract ends, users can export their data by exporting workbooks, downloading data dumps, exporting data extracts, accessing databases directly, or using third-party integration tools.
End-of-contract process
BDB will support and facilitate the buyer in extracting all their data at the end of the contract. Any additional service will be charged extra.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Chrome
  • Safari
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
On Desktop, Using Web Browser users with different access levels, like Admin, Datascientist, Data Engineers can work based on the respective accesses and viewers can view the reports/Dashboards. Mobile App is for Viewing the Reports/Dashboards only.
Service interface
Yes
User support accessibility
WCAG 2.1 AA or EN 301 549
Description of service interface
The Platform has a Web based interface with Drag n Drop functionality
Accessibility standards
None or don’t know
Description of accessibility
BDB Platform can be accessed through any of the certified browser
Accessibility testing
None
API
Yes
What users can and can't do using the API
Users can Publish Data as an API for 3rd party consumption and Model as API.
API documentation
Yes
API documentation formats
HTML
API sandbox or test environment
No
Customisation available
Yes
Description of customisation
All the standard components can be reused across different use cases, BDB Platform provides an extensibility feature where the user will be able to create custom components. BDB Platform provides the following options: BDB Pipeline provides provisions to create a custom component and deploy it. BDB DS Lab enables the user to write the custom script and use it in the Data Science model. BDB Governed Dashboard provides an option to write java scripts to achieve customization.

Scaling

Independence of resources
The BDB Platform is deployed on Kubernetes and based on microservice architecture. Kubernetes allows the auto-scaling if it is enabled while deploying the platform

Analytics

Service usage metrics
Yes
Metrics types
Yes, all interaction on BDB Platform are via API. These API's have interceptors which tracks and logs all the interactions like user logins, dashboard accessed, data sources accessed, modification in reports/dashboard etc
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
BDB Reports/Dashboards supports export option in different formats (csv,xlsx,pdf,ppt)
Data export formats
  • CSV
  • Other
Other data export formats
  • Pdf
  • Xlsx
Data import formats
  • CSV
  • Other
Other data import formats
  • Xlsx
  • JSON
  • Google sheet

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
The availability of our services is dependent on the cloud services on which our platform is hosted.
Approach to resilience
BDB is hosted on cloud service providers like AWS, Azure, GCP etc on which the platform is reliant for resilience
Outage reporting
Our service reports outages through email alerts

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Username or password
  • Other
Other user authentication
SAML

3rd Party Authentication – e.g., Octa, OAuth, CAPPM, LDAP, etc.
Access restrictions in management interfaces and support channels
Role-Based Access Control (RBAC) is implemented to restrict access to management interfaces and support channels based on predefined roles and permissions. These roles, including administrator, manager, and support staff, are assigned with appropriate levels of access.
User Management – User managements comes an entire module inside BDB module where admin can manage various permissions, restrictions related to user & user group. Any user or user group can be assigned or restricted to use various other plug-ins & features of platform. In addition, custom field settings can be created & mapped with the user & user group properties.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Username or password
  • Other
Description of management access authentication
SAML

3rd Party Authentication – e.g., Octa, OAuth, CAPPM, LDAP, etc.

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
We have documented Information Security policies and standards in place. These documents outline our organization's approach to safeguarding sensitive information and data, ensuring the confidentiality, integrity, and availability of our systems and information assets. Our Information Security policies and standards cover various aspects of security, including but not limited to:

Access Control: Policies and procedures governing user access to systems and data.
Data Classification: Guidelines for categorizing and protecting data based on its sensitivity.
Incident Response: Procedures for detecting, reporting, and responding to security incidents.
Network Security: Standards for securing our network infrastructure, including firewalls, intrusion detection/prevention, and encryption.
Password Management: Guidelines for creating and managing secure passwords
Acceptable Use: Rules and expectations for the appropriate use of company resources, including computers and networks.
Encryption: Policies on encrypting sensitive data in transit and at rest.
Physical Security: Measures to protect physical access to data centers and sensitive areas.
Vendor Management: Requirements for evaluating and managing security risks associated with third-party vendors.
Employee Training and Awareness: Initiatives to educate employees about security best practices and their roles in maintaining security.

These policies and standards are regularly reviewed and updated to adapt to changing threats and technologies.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
BDB Platform has the inbuilt capability of VCS (Version Control System) for keeping track of the changes. In BDB Data Center, under Data Set and Data Store, we have options for Push to VCS (Export to VCS) & Pull from VCS (import from VCS) options are present to import/Export cube/dataset from VCS to keep track of the changes.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
BDB has a robust process for releasing patches & configuration updates to address security issues for the BDB Pltform.

Here's a simplified overview of the process:

• Identify vulnerabilities through internal testing, external reports, or threat intel.
• Assess & prioritize vulnerabilities based on severity & potential impact.
• Develop & test patches or fixes.
• Deploy patches & updates, either manually or auto.
• Verify effectiveness.
• Document everything.
• Continuously monitor & update process to stay secure.

BDB promptly addresses security issues & communicates clearly with customers throughout the process.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Our Business Impact Analysis (BIA) is a comprehensive process that identifies a wide range of business interruption risks and evaluates the potential impact of various outage scenarios. We understand the importance of assessing risks comprehensively to ensure the resilience of our operations. Here's how our BIA addresses these aspects:

1. Identification of Business Interruption Risks
2. Range of Outagesdurations and severities of outages.
3. High-Risk Applications
4. Evaluation of Impact
5. Risk Mitigation Strategies
Incident management type
Supplier-defined controls
Incident management approach
Identification and logging of security incidents.
- Classification of incidents based on severity and impact.
- Assigning appropriate resources to investigate and resolve incidents.
- Implementing containment and mitigation measures to minimize impact.
- Documenting and analyzing incidents to prevent recurrence and improve incident response capabilities.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Equal opportunity
  • Wellbeing

Equal opportunity

BDB is an equal opportunity employer and it believes in providing equal employment opportunities to all.

Wellbeing

Our policies reflect our commitment to the wellbeing of our employees.

Pricing

Price
£300.00 a unit a month
Discount for educational organisations
Yes
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at rajmohan.ek@rcubelabs.com. Tell them what format you need. It will help if you say what assistive technology you use.