Relative Insight - Language Analysis & Comparative Text Analytics Platform
Relative Insight is a text analytics platform that uses natural language processing and comparative linguistics to reveal the differences, frequencies and similarities between data sets to bring measurable metrics to your qualitative text data.
Features
- Unlimited users (subject to fair use policy)
- Unlimited words analysed (subject to fair use policy)
- Dedicated Account Manager, comprehensive training and ongoing support
- Analysis of both online and offline language data
- Word, Topic, Phrase, Grammar and Emotional analysis
- Customisable and shareable Dashboard
- Highlights differences in language sets
- Advanced comparative linguistics
- Trend analysis over time
Benefits
- Understand distinct differences in the ways audiences talk
- Uncover differences in the way government, news & consumers talk
- Uncover emerging trends and how these change over time
- Proprietary Emotional, topic, grammar and key word analysis
- Create tailored content, targeted at different audience segments
- Advanced language analysis on top of social listening data
- Advanced language analysis of Qual and Quant data
Pricing
£15,000 a licence a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
5 2 8 1 1 4 2 4 5 5 1 2 3 7 4
Contact
Relative Insight
Commercial team
Telephone: 01524928190
Email: hello@relativeinsight.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- Cannot compare data sets in different languages. e.g. we cannot compare English to French. But can compare English vs English data sets.
- System requirements
- Use of a modern internet browser
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Within 2 business hours - most calls are fixed within 45 minutes
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web chat accessibility testing
- We have not performed this to date
- Onsite support
- Onsite support
- Support levels
- Dedicated Account Manager based in London, who will provide unlimited training and support both in person and via email & phone. Access to our technical analyst team, to advise you on complex projects. All provided at no extra cost and as part of the subscription service.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Relative will always propose a bespoke onboarding service based a specific client's needs. We follow a customer success methodology when onboarding a client, with each element of the process aligned to deliver maximum value. Elements include training, professional services setup and account management.
- Service documentation
- No
- End-of-contract data extraction
- Relative insight is not a data provider. Data is imported to the platform for analysis by the client and therefore will exist on internal systems prior to Relative
- End-of-contract process
- 30-day notice period. We ask our clients to submit notification in writing to their Account Manager. As soon as the notice period has expired, your account will be deactivated and can no longer be accessed.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- The capabilities are the same, however the smaller screen space will mean the user will have to navigate around the screen more
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
-
There is an API for the service that allows the users to do what they would do via the browser but programmatically.
The API is not normally offered by default and is provided on a case by case basis. As part of this it can be customised for clients where feasible - API documentation
- Yes
- API documentation formats
- Other
- API sandbox or test environment
- Yes
- Customisation available
- No
Scaling
- Independence of resources
-
Our analysis platform runs on a scalable platform.
Should more analysis capability be required or more storage needed, then new cloud instances can be seamlessly launched.
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- European Economic Area (EEA)
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Other
- Other data at rest protection approach
-
Data is stored on Amazon cloud instances, with physical access controlled by them
Data is not encrypted, but digital access controls are in place to ensure that only clients can access their data, along with key people within the company when necessary (account managers, technical heads) - Data sanitisation process
- No
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Users are able to export the analysis as a CSV file via the web based dashboard
- Data export formats
- CSV
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- Text files
- Excel
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
Our service has an availability guarantee of 99%, and in the lifetime of the company this has never been breached.
Should it ever be the case that our availability drops below this level, then clients will receive credits that can be used to provide extra analysis time or projects for use within our system - Approach to resilience
-
We have a 3 tier architecture - frontend, backend, data. Each operates on their own instance, meaning that replacement instances can be quickly and seamlessly started up should a problem develop.
All our cloud instances are backed up daily. - Outage reporting
- Email alerts and calling clients where possible
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
-
Account managers assigned to the client have access to client data, no other support or account managers do
Only the CTO and COO have access to client data via database access - no other members of the company do - Access restriction testing frequency
- At least every 6 months
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- ISOQAR
- ISO/IEC 27001 accreditation date
- 11/12/2020
- What the ISO/IEC 27001 doesn’t cover
- All aspects of the companies operation are covered by the certification
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
As part of our ISO 27001 Information Security Management System, we have a number of security policies in place that we follow.
Specifically:
1. Information Security Policy (A5.1.1)
2. Mobile Devices and Teleworking Policy (A6.2.1)
3. Acceptable Use of Assets Policy (A8.1.3)
4. Information Classification Policy (A8.2.1)
5. Disposal and Destruction Policy (A8.3.2)
6. Access Control Policy (A9.1.1)
7. Password Policy (A9.3.1)
8. Use of Cryptographic Controls Policy (A10.1.1)
9. Clear Desk and Screen Policy (A11.2.9)
10. Backup Policy (A12.3.1)
11. Information Transfer Policy (A13.2.1)
12. Social Media Policy (A13.2.3)
13. Policy for Supplier Relationships (A15.1.1)
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Each change request is recorded on a change management system. Each change is then reviewed, including any potential security impact which is noted, a scheduling decision is made by the CTO as to when the change should be made. Each source code modification to enact the change is logged and attached to the original change request. Any unit tests associated to the change are also recorded. Before deployment all changes are reviewed to ensure unit tests are passed and the change meets the original requirements.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Information from potential threats is received via email alerts from the UK's National Cyber Security Central and the US's National Cyber Awareness System. The seriousness of threat determines our response, with serious threats being patched within an hour of discovery.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- All server instances are monitored for unauthorised access and other unusual activity by monitoring traffic patterns. Weekly penetration testing is also conducted by a 3rd party to discover any potential weaknesses. Upon discovery, the potential compromise is investigated, lead by the CTO, to determine whether a compromise has actually occurred. If a compromise has occurred our incident management process is initiated. Otherwise, the threat is assessed and prioritised with patches applied within an hour for the most serious of threats.
- Incident management type
- Supplier-defined controls
- Incident management approach
-
Relative Insight has a defined incident management policy, that all employees are required to adhere to.
Any incidents are captured within a Security Incident Form that is passed to the IS officer for review.
The IS officer will then determine the appropriate course of action.
Clients are able to report incidents to their account manager, who will then complete a Security Incident Form.
Should a security incident impact on a client, they will immediately be informed by email and phone.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Equal opportunity
-
Equal opportunity
Relative Insight takes equal opportunities very seriously and has policies in place that ensure it is considered from hiring through to every day employment.
Pricing
- Price
- £15,000 a licence a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- A small test piece ran on your data, mini training session, 48 hours of access to the platform.