MECBOT: AUGMENTED DATA MANAGEMENT PLATFORM (AI & ML)
Trusted augmented data management and excellence platform for real-time analytics and decisions at scale and enterprise AI needs. Comes bundled with a self-service, intuitive interface and manages all your data no-code lo-code and provides insights and data driven decisions, including scalable deployment.
Features
- Real-time analytics
- Structured and unstructured data analysis
- Smart data fabric
- Auto-detection of patterns
- Connected data analytics
- Metaspace : Smart Metadata Powerhouse
- Interoperable
- Guided AI using Generative AI
- Single API to connect downstream
- Intelligent data mesh
Benefits
- Business-focussed
- No-code Lo-code system
- Operational from Day 1
- Scalable to few PetaBytes
- Reduces the time from data to insight considerably
- Real-time data analysis
- Cost savings
- Centralized security and compliance
- Not vendor locked with any cloud providers
- Rapid data-driven application development
Pricing
£45,000 to £70,000 a terabyte a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
5 1 0 2 0 4 0 3 3 0 6 5 3 3 5
Contact
FORMCEPT TECHNOLOGIES & SOLUTIONS PRIVATE LIMITED
Sam Bhaskar
Telephone: +44 7841 118452
Email: sam.bhaskar@formcept.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
- No
- System requirements
-
- Linux based system
- Dedicated and reserved instances from the cloud or on premise
- Cluster of machines is required
- Cloud and Standalone environment
- Oracle JAVA
- Root access to machine
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
8h x 5d (Working Days)
24h x 7d support can be provided at an additional cost - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Yes, at an extra cost
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
-
Accessible via the website with one-click / single-click.
Supported by ZenDesk ticketing system. - Web chat accessibility testing
- Done by the provider (ZenDesk)
- Onsite support
- Yes, at extra cost
- Support levels
-
Level 1 / Level 2 / Level 3 with phone / email / 24X7 and 8X5.
• Critical (Severity 1) - Response time 1 hour with update every 1 hour until incident resolution. Support coverage will be provided during Business and Non-business hours
• High (Severity 2) - Response time is 2 hour with updates every 4 hours until incident resolution. Support coverage will be provided during Business hours and non-business hours
• Medium (Severity 3) - Response time is 1 working day with updates every 1 working day. Support coverage will be provided during Business hours
• Low (Severity 4) - Response time is 2 working days with updates until incident resolution. Support coverage will be provided during Business hours.
Cost depends, if the support is on-site or off-site (via phone or webchat).
Technical account manager and/or cloud support engineer provided under different support plans and options. - Support available to third parties
- No
Onboarding and offboarding
- Getting started
-
Online training and / or user documentation.
In order to help users get started with the service we provide extensive online training sessions. Training sessions are conducted based on the user roles that each user would have.
Multiple sessions are conducted in order to ensure high-user adoption of the platform.
Users are also provided with documentation in order to enable them to use the platform in a much more efficient manner. - Service documentation
- Yes
- Documentation formats
-
- HTML
- ODF
- Other
- Other documentation formats
- Markdown
- End-of-contract data extraction
-
Provision to dump entire data via CSV format (also possible in alternate format on request).
Also, we could offer repository services with a link for an agreed period of time, if required or requested. - End-of-contract process
-
The entire data is purged and reformatted. No information or data is stored elsewhere.
All the data will be migrated and provided to customer as and when customer requires.
Platform with data ingestion including any customization based on user requirements including mobile applications, if requested / required.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- Yes
- Compatible operating systems
- Linux or Unix
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- End cognitive applications are available on mobile (landscape mode)
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
-
Mail or Jira ticket.
Also we have a bespoke tool for managing support services, if required.
Users can use the UI application to achieve various business operations. - Accessibility standards
- None or don’t know
- Description of accessibility
-
We provide role based access and only people with relevant roles can access data that is shared.
End applications or services are available as Web based application with role based access. - Accessibility testing
- We have not tested our product across people with disability or people with special skills, however we are working to support this in near future.
- API
- Yes
- What users can and can't do using the API
-
APIs can be used or verified by curl / postman.
Changes to the APIs can't be made by the user / users. They can only read or query.
Updates to data or adding new data through the pipeline only. - API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
Everything can be customized.
Partners or System Integration or we can do it.
If we do it, there will be an additional charge depending on the level of customization to be conducted.
The platform is infinitely customizable and can be mirrored to reflect the buyer's business processes. Any requests for customization are received and would be made during implementation.
1. The configuration of the organization such as region, BU, Contract category/Sub-category
2. User roles and access rights
3. The data, option and other details available on the home screen etc.
Certain customizations such as User roles, access rights and details available on the home screen can be made via the product interface.
Customizations such as Changing the organization structure can be performed with the help of the Customer success manager.
Admin users as well as the Customer support team.
Scaling
- Independence of resources
-
Multi-tenant platform – Islanded / secluded per customer .
Scalable system (vertically & horizontally).
Also, we could use bespoke network and application management tools to ensure that users aren't affected during peak hours, if required.
We have auto-scalability of our services in order to guarantee users aren't affected by demand of other users.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Depends on the app. But usage, who is using how much etc.
Operational metrics.
Any other metrics requested by the user.
Customised as per user needs and requirements. - Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Other
- Other data at rest protection approach
-
Encryption of data at REST.
Banking Grade encryption.
We encrypt data at rest using a variety of tools including (but not limited to):
1. Utilizing managed databases by our infrastructure provider which have options to encrypt data at rest. In these cases, encryption keys are managed by the infrastructure provider.
2. Utilizing the infrastructure provider's option to encrypt the underlying storage of the assets that persist data. Again, encryption keys are managed by the infrastructure provider.
3. Company laptops are encrypted as outlined in the Endpoint Security Policy. - Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Json or CSV option to export or dump data within the MECBOT platform
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- Json
- Parquet
- Avro
- Data import formats
-
- CSV
- ODF
- Other
- Other data import formats
-
- Json
- Parquet
- Avro
- DBs
- CSV
- XLS
- Word
- Machine date over https / CoAp / MQTT / OCPP
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Other
- Other protection within supplier network
-
4 levels of security protection we provide:
Network Security by islanding the clusters of machines where MECBot is running (Perimeter security)
Data Protection (HTTPS on transit and at rest can be encrypted, if customer wants)
Access Controlled and only people with relevant access can access data they are allowed to.
Audit and Lineage.
Availability and resilience
- Guaranteed availability
- We guarantee a 99.99% level of availability. We run on Microsoft Azure / Amazon / GCP and these providers ensure 99.99% of availability. Azure / Amazon / GCP provides payback if availability limit is breached.
- Approach to resilience
- Available on request
- Outage reporting
- All of the above
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
-
Access Control (Java Web Token based) Only authenticated users are permitted or allowed access and could be at different levels, if required.
We have elaborate rules and permissions management module. - Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- ACCORP PARTNER INC.
- ISO/IEC 27001 accreditation date
- 21/06/2023
- What the ISO/IEC 27001 doesn’t cover
- All our services are covered by this certification
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
- SOC2 TYPE2
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- ISO/IEC 27001
- Other
- Other security governance standards
-
ISO 270001
SOC2 TYPE 2
OSWE, EC Council
Our platform is behind firewall and will be hosted on AWS/GCP/Oracle/Azure which are strictly compliant to all the standards. - Information security policies and processes
-
Provided on request.
Mainly covers :
The Pillars of Information Security program are
1. Information Security Training
2. Incident Management
3. Vulnerability Management
4. Data Classification
5. Data Backup
6. Data Retention
7. Encryption
8. Endpoint Security
9. Physical Security
10. Acceptable Use Policy
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
Code repository / Version Control / JIRA ATLASSIAN
Change management process ensures that all software developed in the service of or any subdomain of should be version controlled.
We use a decentralized version control system like git. This allows engineers to work on bug fixes, new feature development and other independent projects simultaneously. Before synchronising with the central repository, engineers work on local branches created from an appropriate version of the central repository. Changes are tested locally before the being deployed to users
The policy outlines procedures for conducting planned and unplanned changes as well.
We use a version-controlled system. - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
Reporting
The Information Security Officer is responsible for communicating detected vulnerabilities and package updates needed to the appropriate vulnerability management system where it can be tracked to resolution.
Remediating Vulnerabilities
The engineering staff is responsible for remediating any reported vulnerabilities. The remediation process should be tracked in the vulnerability management system. SLAs are in place to help prioritize vulnerability based on severity
Possible resolution statuses
1. Fixed
2. Inaccurate/Incorrect
3. Vulnerable section unused
4. Acceptable risk
Perform various internal vulnerability scans and package monitoring on a constant basis.
Perform external vulnerability-scans/penetration-tests periodically.
Patches : 24-48h.
Source : Public medium. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
How you identify potential compromises : Monitoring system in-house.
How you respond when you find a potential compromise : Notification via email.
How quickly you respond to incidents : Instant.
We use monitoring tools in order to identify network intrusions.
The support team is available 24/7 to find the root cause and fix the vulnerabilities.
The time period taken to respond to incidents depends on severity of incident, mostly instant. - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
JIRA
JIRA Ticketing system
JIRA reporting
Pre-defined processes for said events
1. Report the incident immediately to your manager as soon as possible.
2. If manager is not available, employees are to approach the ISO / CEO to report the incident.
ISO is responsible for ensuring that reported security-incidents are added to the appropriate incident management system.
At any given point of time, On-Call-Engineer (OCE) is the first point of contact and responsible for addressing the incident.
The following are the levels of severity
• Low severity incidents
• Medium Severity incidents
• High severity incidents
• Critical severity incidents
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Fighting climate change
Fighting climate change
We have systems and process geared to save energy in our data centersCovid-19 recovery
Covid-19 recovery
Covid-19 recovery
We have a process in place to manage services remotely and our teams are aware of Covid protocolsTackling economic inequality
Tackling economic inequality
Tackling economic inequality
Our organization work with teams, where we contribute towards the wellbeing and employment of resource from economically diverse backgrounds.Equal opportunity
Equal opportunity
Equal opportunity
We are a merit oriented organization and our teams are balanced in representation and we conscious of this attributeWellbeing
Wellbeing
Wellbeing
The management are firm followers of well being and teams are encouraged to follow yoga and healthy food habits within the organisation
Pricing
- Price
- £45,000 to £70,000 a terabyte a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- 14 days trial period and what's included / excluded can be discussed and agreed.