AI Automation - ConnectingYouNow + AI Project Risk Assessment - FireBreak
ConnectingYouNow (CYN): AI-powered platform streamlining public sector service access, Employee IT issue resolution, and escalations. WCAG 2.1 compliant, driving efficiency and cost savings.
FireBreak.ai an AI-powered Project Risk Intelligence Platform that helps government organisations detect, manage and prevent project risks before they escalate. Reducing Financial Waste through Increased Transparency.
Features
- Search based on natural language conversation
- 2-way conversations in both text and spoken word
- Accessibility settings built in
- Source information from multiple sources in multiple format
- Analytics showing usage and comparisons of queries and available content
- Geographic analytics comparing search and answer locations
- Works alongside existing websites
- Guardrails to protect vulnerable users
- FireBreak is a trained Scrum and Prince2 co-pilot
- FireBreak AI understands Excel, Word, Jira, etc content
Benefits
- Inequality is addressed; Citizens find what they need more quickly
- 50% improvement in search accuracy over standard keyword search
- Identification of gaps and overlaps in existing service offerings
- Digital barriers removed: Accessibility is built in - WCAG certified
- Identification of content inconsistencies for improved content quality and relevance
- Simple implementation and on-going maintenance
- FireBreak AI: Real-time risk management
- FireBreak AI: Improved decision-making and outcomes
- FireBreak AI: Optimised resource usage
- FireBreak AI: Enhanced reporting and compliance
Pricing
£2 to £3 a transaction
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
5 7 6 3 2 7 6 7 3 0 5 4 8 4 7
Contact
InsightsDriven.io Ltd
Jora Gill
Telephone: 07814461141
Email: Jora.Gill@insightsdriven.io
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- It can be used as an extension to any responsive web site.
- Cloud deployment model
- Public cloud
- Service constraints
- No, the service supports any responsive website.
- System requirements
-
- Read access to trusted source documents / service descriptions
- Change to buyer's content security policy
- Change to buyer's permissions policy
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Questions will be acknowledged within 15 minutes.
They will be responded to within 4 working hours.
Working hours are 09:00 - 17:00 Monday - Friday, excluding bank holidays. - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- No
- Web chat support
- No
- Onsite support
- No
- Support levels
-
All customers are provided with the same level of support and all will be allocated an account manager.
Severity 1 issues will be resolved in 4 hours of notification.
Severity 2 issues will be resolved within 8 hours of notification. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- The CYN user experience has been designed and tested to be as simple as possible with no need for user training once the service has been implemented.
- Service documentation
- No
- End-of-contract data extraction
- Buyer's data is extracted by the service team if required as part of the off-boarding process.
- End-of-contract process
-
The standard contract runs for 12 months and auto-renews.
If a contract is ends then the buyer will be contacted by their Account Manager who will arrange for a smooth termination of the service and provision of any customer data.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Mobile version uses whole screen interface where the desktop uses a side panel. When reference documents are opened on a mobile they open in a new browser window as opposed to the left panel.
- Service interface
- No
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- API
- No
- Customisation available
- Yes
- Description of customisation
-
The following can be customised by CYN implementation team in collaboration with the buyer: Colour schemes, AI personality, guardrail actions, human intervention routing, PDF output formatting, Analytics dashboard.
The initiation point and experience can be customised by the buyer's technical team in collaboration with the CYN implementation team.
Scaling
- Independence of resources
- Each buyer has their own implementation of CYN, installed on buyer specific environment. Each environment scales independently as required by the loads that environment is experiencing.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
CYN provides usage (conversation) metrics as well as categorised views of searches performed and geographic representation where searches are carried out.
CYN also provides details of users' feedback on the usefulness of recommendations. - Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Other
- Other data at rest protection approach
- ISO/IEC 27017 (Cloud Security)
- Data sanitisation process
- No
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
-
Users can export their current conversation (session) data into a PDF document which they can store locally.
Once a session ends that data is no longer available to any user online. - Data export formats
- Other
- Other data export formats
- Data import formats
- Other
- Other data import formats
- None
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
We have a target availability of 99.9%.
For each period of downtime lasting longer than one hour, InsightsDriven will credit Buyer 5% of Service fees for each period of 60 or more consecutive minutes of downtime; provided that no more than one such credit will accrue per day - Approach to resilience
-
All services utilise 3 nodes, each node in a separate availability zone (data centre).
All data is replicated across the 3 nodes to provide resilience.
All services have been designed to retry multiple times on failure before terminating gracefully. - Outage reporting
- Email alerts and in the public dashboard of the service management tool.
Identity and authentication
- User authentication needed
- No
- Access restrictions in management interfaces and support channels
-
Users need to authenticate to raise and review support requests or incidents - using username and password.
Management interfaces are authenticated using username / password with 2FA as defined by the underlying cloud service providers IAM tooling. - Access restriction testing frequency
- At least once a year
- Management access authentication
- 2-factor authentication
Audit information for users
- Access to user activity audit information
- No audit information available
- Access to supplier activity audit information
- No audit information available
- How long system logs are stored for
- Between 1 month and 6 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
-
We build in security from the start, each team has a security champion that ensures that all designs include security considerations.
All designs are reviewed with the CTO before implementation.
Vulnerability testing is built into the development process - critical and high level breaches break the build, stopping the deployment. - Information security policies and processes
-
Information is controlled on a least permission basis. Only support team members have access to production environments and data. Data is not copied to lower environments.
Product managers are responsible for the information security of their products.
Product managers report to the CTO who is ultimately responsible for the security of all company products.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Source code is managed in GitHub using short-lived feature branches.
Merged source code is built, using a CI pipeline. Created artefacts are versioned and stored in an artefact repository.
Artefacts are combined into containerised Docker images which are then deployed into environments using a CD pipeline.
The CI pipeline includes Static Code analysis. The CD pipeline includes Dynamic code analysis. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Vulnerabilities are checked in the CI pipeline before code is merged back into the main code base.
Supplier patches are checked daily. Critical and High rated patches force services to be rebuilt and to enter the test cycle.
We use Trivy to alert and scan for vulnerabilities. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Each part of the system is reporting metrics about its status, uptime, number of events and many more parameters. System policies are configured to track some of them and check whether they are in their expected ranges, if not they will raise alerts and create automatic incident tracking. Notifications are also sent on a selected set of alerting channels (Slack and email). For system condition serviceability there are dashboards prepared which are presenting current and historical behaviour of the system and its load.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
Users report incidents into our Jira service management system.
The triage process identifies duplicates and checks if the issue has already been rectified (manually or automatically).
A priority - 1-5 is assigned to the ticket and it is managed appropriately.
Priority 1 tickets are dealt with by a team swarm and the CTO is included.
Users are informed of updates and changed of ticket status.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Equal opportunityEqual opportunity
CYN was designed and to improve the access to public services for people who are digitally excluded, people with disabilities and non-digital natives. It's use of natural language, the ability to speak or type and its variety of accessibility settings along with its extremely simple interface ensure that it works well for as many people as possible, breaking down digital barriers.
Pricing
- Price
- £2 to £3 a transaction
- Discount for educational organisations
- No
- Free trial available
- No