Relative Insight

Relative Insight - Language Analysis & Comparative Text Analytics Platform

Relative Insight is a text analytics platform that uses natural language processing and comparative linguistics to reveal the differences, frequencies and similarities between data sets to bring measurable metrics to your qualitative text data.

Features

  • Unlimited users (subject to fair use policy)
  • Unlimited words analysed (subject to fair use policy)
  • Dedicated Account Manager, comprehensive training and ongoing support
  • Analysis of both online and offline language data
  • Word, Topic, Phrase, Grammar and Emotional analysis
  • Customisable and shareable Dashboard
  • Highlights differences in language sets
  • Advanced comparative linguistics
  • Trend analysis over time

Benefits

  • Understand distinct differences in the ways audiences talk
  • Uncover differences in the way government, news & consumers talk
  • Uncover emerging trends and how these change over time
  • Proprietary Emotional, topic, grammar and key word analysis
  • Create tailored content, targeted at different audience segments
  • Advanced language analysis on top of social listening data
  • Advanced language analysis of Qual and Quant data

Pricing

£15,000 a licence a year

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at hello@relativeinsight.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 13

Service ID

5 2 8 1 1 4 2 4 5 5 1 2 3 7 4

Contact

Relative Insight Commercial team
Telephone: 01524928190
Email: hello@relativeinsight.com

Service scope

Software add-on or extension
No
Cloud deployment model
Private cloud
Service constraints
Cannot compare data sets in different languages. e.g. we cannot compare English to French. But can compare English vs English data sets.
System requirements
Use of a modern internet browser

User support

Email or online ticketing support
Email or online ticketing
Support response times
Within 2 business hours - most calls are fixed within 45 minutes
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
WCAG 2.1 AA or EN 301 549
Web chat accessibility testing
We have not performed this to date
Onsite support
Onsite support
Support levels
Dedicated Account Manager based in London, who will provide unlimited training and support both in person and via email & phone. Access to our technical analyst team, to advise you on complex projects. All provided at no extra cost and as part of the subscription service.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Relative will always propose a bespoke onboarding service based a specific client's needs. We follow a customer success methodology when onboarding a client, with each element of the process aligned to deliver maximum value. Elements include training, professional services setup and account management.
Service documentation
No
End-of-contract data extraction
Relative insight is not a data provider. Data is imported to the platform for analysis by the client and therefore will exist on internal systems prior to Relative
End-of-contract process
30-day notice period. We ask our clients to submit notification in writing to their Account Manager. As soon as the notice period has expired, your account will be deactivated and can no longer be accessed.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Chrome
  • Safari
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
The capabilities are the same, however the smaller screen space will mean the user will have to navigate around the screen more
Service interface
No
User support accessibility
None or don’t know
API
Yes
What users can and can't do using the API
There is an API for the service that allows the users to do what they would do via the browser but programmatically.

The API is not normally offered by default and is provided on a case by case basis. As part of this it can be customised for clients where feasible
API documentation
Yes
API documentation formats
Other
API sandbox or test environment
Yes
Customisation available
No

Scaling

Independence of resources
Our analysis platform runs on a scalable platform.
Should more analysis capability be required or more storage needed, then new cloud instances can be seamlessly launched.

Analytics

Service usage metrics
No

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
European Economic Area (EEA)
User control over data storage and processing locations
No
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Other
Other data at rest protection approach
Data is stored on Amazon cloud instances, with physical access controlled by them
Data is not encrypted, but digital access controls are in place to ensure that only clients can access their data, along with key people within the company when necessary (account managers, technical heads)
Data sanitisation process
No
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Users are able to export the analysis as a CSV file via the web based dashboard
Data export formats
CSV
Data import formats
  • CSV
  • Other
Other data import formats
  • Text files
  • Excel

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Our service has an availability guarantee of 99%, and in the lifetime of the company this has never been breached.

Should it ever be the case that our availability drops below this level, then clients will receive credits that can be used to provide extra analysis time or projects for use within our system
Approach to resilience
We have a 3 tier architecture - frontend, backend, data. Each operates on their own instance, meaning that replacement instances can be quickly and seamlessly started up should a problem develop.
All our cloud instances are backed up daily.
Outage reporting
Email alerts and calling clients where possible

Identity and authentication

User authentication needed
Yes
User authentication
Username or password
Access restrictions in management interfaces and support channels
Account managers assigned to the client have access to client data, no other support or account managers do

Only the CTO and COO have access to client data via database access - no other members of the company do
Access restriction testing frequency
At least every 6 months
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
ISOQAR
ISO/IEC 27001 accreditation date
11/12/2020
What the ISO/IEC 27001 doesn’t cover
All aspects of the companies operation are covered by the certification
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
As part of our ISO 27001 Information Security Management System, we have a number of security policies in place that we follow.

Specifically:
1. Information Security Policy (A5.1.1)
2. Mobile Devices and Teleworking Policy (A6.2.1)
3. Acceptable Use of Assets Policy (A8.1.3)
4. Information Classification Policy (A8.2.1)
5. Disposal and Destruction Policy (A8.3.2)
6. Access Control Policy (A9.1.1)
7. Password Policy (A9.3.1)
8. Use of Cryptographic Controls Policy (A10.1.1)
9. Clear Desk and Screen Policy (A11.2.9)
10. Backup Policy (A12.3.1)
11. Information Transfer Policy (A13.2.1)
12. Social Media Policy (A13.2.3)
13. Policy for Supplier Relationships (A15.1.1)

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Each change request is recorded on a change management system. Each change is then reviewed, including any potential security impact which is noted, a scheduling decision is made by the CTO as to when the change should be made. Each source code modification to enact the change is logged and attached to the original change request. Any unit tests associated to the change are also recorded. Before deployment all changes are reviewed to ensure unit tests are passed and the change meets the original requirements.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Information from potential threats is received via email alerts from the UK's National Cyber Security Central and the US's National Cyber Awareness System. The seriousness of threat determines our response, with serious threats being patched within an hour of discovery.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
All server instances are monitored for unauthorised access and other unusual activity by monitoring traffic patterns. Weekly penetration testing is also conducted by a 3rd party to discover any potential weaknesses. Upon discovery, the potential compromise is investigated, lead by the CTO, to determine whether a compromise has actually occurred. If a compromise has occurred our incident management process is initiated. Otherwise, the threat is assessed and prioritised with patches applied within an hour for the most serious of threats.
Incident management type
Supplier-defined controls
Incident management approach
Relative Insight has a defined incident management policy, that all employees are required to adhere to.
Any incidents are captured within a Security Incident Form that is passed to the IS officer for review.
The IS officer will then determine the appropriate course of action.
Clients are able to report incidents to their account manager, who will then complete a Security Incident Form.
Should a security incident impact on a client, they will immediately be informed by email and phone.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Equal opportunity

Equal opportunity

Relative Insight takes equal opportunities very seriously and has policies in place that ensure it is considered from hiring through to every day employment.

Pricing

Price
£15,000 a licence a year
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
A small test piece ran on your data, mini training session, 48 hours of access to the platform.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at hello@relativeinsight.com. Tell them what format you need. It will help if you say what assistive technology you use.