Dataiku
Dataiku is a comprehensive data science and machine learning platform that enables collaborative, enterprise-ready analytics. It offers no-code/low-code capabilities, scalable computing, broad integration, and easy operationalization of analytical solutions with governance and explain-ability features.
Features
- Data preparation
- Model building, deployment and monitoring
- Visual drag and drop interfaces
- DataOps
- Governance
- Machine learning
- Automated data pipelines, model training and documentation
- Monitoring and alerting to ensure health of deployed models
- Explainable AI
Benefits
- End-to-End Analytics Platform
- Broad Integration Capabilities
- No-Code/Low-Code Capabilities
- Collaborative and Enterprise-Ready
- Scalable and Distributed Computing
- Governance and Explain-ability
- Operationalization and Deployment
Pricing
£101,430 an instance
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
6 0 2 9 0 5 4 3 2 1 7 2 1 5 9
Contact
Billigence
Michael Evans
Telephone: 07951 391 823
Email: michael.evans@billigence.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
- No particular constraints.
- System requirements
- Modern Internet browsers
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Dataiku will adhere to the Service Level Agreement (SLA), if any, specified on each applicable Order.
- User can manage status and priority of support tickets
- No
- Phone support
- No
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Dataiku will adhere to the Service Level Agreement (SLA), if any, specified on each applicable Order.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Billigence has a team of Dataiku accredited data engineers can perform initial setup of your Dataiku instance, configure data connections and outputs and set up some example models and provide training.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
-
Source data is not retained within Dataiku platform.
Trained models can be exported from Dataiku in XML format at any time during the contract. - End-of-contract process
- At the end of the contract the licences expire, users are no longer able to log in and access the service. After a 7 day grace period, any data held is deleted.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
-
Matillion is an enterprise data integration platform. These platforms typically provide a web-based user interface for managing and administering the service. This interface would be accessible by authorized users, likely including administrators.
Administrative tasks require access to configuration and settings. Some tasks that might require an admin interface include managing user accounts and permissions, configuring data sources and destinations, setting up schedules for data flows, and monitoring job execution. - Accessibility standards
- None or don’t know
- Description of accessibility
- The Dataiku platform is currently partially compliant with WCAG 2.1A and benefits from browser accessibility features as a web-based application.
- Accessibility testing
- Available upon request.
- API
- Yes
- What users can and can't do using the API
-
Python API - for more information please refer to: https://doc.dataiku.com/dss/latest/python-api/index.html
R API - for more information please refer to: https://doc.dataiku.com/dss/latest/R-api/index.html
Public REST API - for more info please refer to:
https://doc.dataiku.com/dss/latest/publicapi/index.html
Javascript API for webapps - for more info please refer to:
https://doc.dataiku.com/dss/latest/api/index.html
The Scala API, for documentation please refer to:
https://doc.dataiku.com/dss/api/12/scala - API documentation
- Yes
- API documentation formats
-
- HTML
- Other
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
Integration with customer tools and systems as it support wide scale of data sources connection, ML, business intelligence, customer internal systems and API.
Adjustment of user interface - visual and user environment, colour scheme, icons, components layout, etc.
Extension with customer development and plug ins to extend its nationality, development of customer tools, workflows and analysis which are based on customer specific needs.
User access management and roles.
Automation and orchestration.
Scaling
- Independence of resources
-
Each customer is assigned a dedicated Dataiku backend application running in a container on a Kubernetes
cluster with strict network policies and a least privilege policy. Additionally, Dataiku application customer data
is logically segregated within AWS and stored on a dedicated EBS volume only accessible by the customer's
dedicated backend.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
DSS acts as the central orchestrator of many computation resources, from SQL databases to Kubernetes. Through DSS, users can leverage these elastic computation resources and consume them. It is thus very important to be able to monitor and report on the usage of computation resources, for total governance and cost control of your Elastic AI stack.
DSS includes a complete stack for reporting and tagging compute resources. The data gathered through this stack is sent through the audit centralization mechanism and can be analyzed centrally (across multiple DSS instances) using DSS. Dashboards can be built from there.
Resellers
- Supplier type
- Reseller providing extra support
- Organisation whose services are being resold
- Dataiku
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Other
- Other data at rest protection approach
-
Dedicated, encrypted EBS volumes for each customer.
Encrypted cloud storage for processed data (optional).
Encrypted central database for customer subscriptions.
Customer-sensitive information further encrypted for extra protection.
Customers can choose storage region and connect their own storage (their responsibility). - Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- There are several ways how to export data from Dataiku, all listed below.
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- XLSX
- JSON
- Python
- ML flow model
- Jupyter notebook
- Snowflake function
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- JSON
- Relational or analytical database
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- Other
- Other protection between networks
-
Dataiku operated with shared security responsibility and connection between Dataiku Cloud and the user is under responsibility of Dataiku, who is always using HTTPS, which protects data-in-transit using Transport Layer Security (TLS) by providing authentication and privacy and integrity of data exchanged. These connections always utilize
TLS1.2 or higher,
Connections between Dataiku Cloud and customer´s data are customer´s responsibility, Dataiku supports integration with encrypted solutions which comply with customer requirements. - Data protection within supplier network
-
- TLS (version 1.2 or above)
- Other
- Other protection within supplier network
-
Dataiku utilizes tools such as AWS Web Application Firewall (WAF), which protects Dataiku Cloud from web
exploits, and AWS GuardDuty, which detects and monitors for compromised accounts, anomalous behavior,
and malware. Which provides a properly secured perimeter. Alerts are generated for any irregular
activity,depending on the criticality of the associated assets, these alerts are escalated to the Site
Reliability Engineering (SRE) team to assess whether actions are needed. The SRE carefully plans and
reviews the threshold or logic that triggers these alerts regularly. The SRE monitors the
performance of these tools and responds as necessary to protect against these threats.
Availability and resilience
- Guaranteed availability
-
Dataiku Cloud benefits from the high availability targets and service level agreements AWS provides to deliver
the services. The Dataiku Cloud Service Reliability Engineering Team continuously monitors these availability
targets to ensure our customers enjoy the guaranteed availability targets specified within our Service Level
Agreements. - Approach to resilience
- Where a Dataiku VM is hosted in the cloud, it relies primarily on the resilience of the hosting cloud platform.
- Outage reporting
-
This is dependent on availability of the Cloud service.
All backups are managed by our cloud providers and are encrypted. Dataiku DSS data (project configuration,
recipes, notebook, etc.) is backed up every 6 hours. This backup is executed leveraging AWS EBS snapshot and
monitored closely. Backups have at least four days of retention and upto3months.Theretentionperiodvaries
with the Dataiku Cloud edition. All backups are retained by AWS.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Username or password
- Other
- Other user authentication
-
Dataiku customers have the option to bring their own identity provider via SAML v2 integration. In that case, all
password policies, along with MFA requirements, remain under our customerʼs governance and control. - Access restrictions in management interfaces and support channels
-
Unless access is needed for regular maintenance to ensure Dataiku Cloudʼs security and performance, Dataiku
will not access customer data without explicit consent from the customer. This access is only granted to a
limited group of individuals within Dataiku and is closely monitored and audited. Additionally, access is only
available under Multi-Factor Authentication (MFA). Virtual Private Network (VPN) is also needed to access critical
administrative areas of Dataiku Cloud. Our customers can also grant or deny the Dataiku Support teamaccess
for technical support interactions by clicking an approval button. - Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Other
- Description of management access authentication
- Dataiku customers have the option to bring their own identity provider via SAML v2 integration. In that case, all password policies, along with MFA requirements, remain under our customerʼs governance and control.
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Schellman Compliance, LLC
- ISO/IEC 27001 accreditation date
- 27/7/2023
- What the ISO/IEC 27001 doesn’t cover
- Certification covers any main parts of the processes.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
-
- ISO 27701
- SOC2TypeII
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
Dataiku follows all processes up to the certified standards.
For further information please refer to:
https://doc.dataiku.com/dss/latest/security/index.html
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Dataiku has a change management procedure to ensure changes to Dataiku products and services are
implemented consistently with clearly defined roles and responsibilities. All changes to our product are strictly
controlled. Change requests for our products are tracked using a change tracker, where progress, status, and
approvals are recorded prior to each release. Steps in the change management process include:
-Creation of Change request
-Change Categorisation and Assessment
-Testing of Change
-Aproval of Change
-Release commitment
-System Change Logs
The Dataiku issues notification for scheduled maintenance with a system-wide banner or email notification at least 2 days in advance. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Dataiku has a vulnerability management program actively managed by the Dataiku Cloud team, leveraging
industry-standard tools and internal capabilities. Vulnerability scans are performed regularly. Dataiku
proactively manages security risks through vulnerability scans and follow-up remediation efforts. Dataiku also
continually reviews patches and updates, where relevant, as they are released to determine criticality and
impact on Dataiku offerings. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
The logging mechanism is monitored by an independent component that leverages a metric collection and alerting system. Depending on the criticality of the associated assets, alerts are triggered to the SRE Team to assess whether an action is needed.Escalations,if any,are reviewed on a 24/7 basis.Carefully planed and reviewed are threshold that triggers these alerts on a regular basis. Once an alert is raised,SRE team follows our Standard alert response
procedure.
Other than basic PII information needed for logging and auditing purposes, Dataiku does not store sensitive information on logs. Logs are properly retained in accordance with Dataikuʼs Records Retention
Schedules. - Incident management type
- Supplier-defined controls
- Incident management approach
-
When an incident is reported,the incident response plan is triggered with an initial responder from the Dataiku Cloud support team assigned.The responder assembles an incident response team relevant to the type and
severity of the incident.The team reviews the details provided for the incident and obtains more information from the reporter if necessary.The team then assigns a classification ranging from Critical to Low,depending on the severity and impact of the incident,and reports the status regularly,escalates when required.External communication,if applicable,will be made available per our contractual and regulatory obligations.Our customers can report suspected incidents via Dataikuʼs self-service Intercom portal or email.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Equal opportunity
Fighting climate change
We endeavour to do our best in fighting climate change and have made an active effort to switch our delivery to remote working vs onsite delivery where possible, thus reducing our travel & impact on the environment.Equal opportunity
Being an equal opportunity employer cultivates a workplace where diversity is embraced and valued. It fosters inclusivity, ensuring all individuals have fair opportunities for employment and advancement regardless of race, gender, age, religion, or background. By prioritizing diversity and inclusion, organizations harness the full spectrum of human potential, driving innovation, creativity, and problem-solving. Embracing equality in employment not only reflects ethical responsibility but also enriches company culture, improves employee morale, and enhances productivity. Ultimately, as a social value, being an equal opportunity employer promotes fairness, equity, and respect, contributing to a more just and harmonious society.
Pricing
- Price
- £101,430 an instance
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- Limitation in number of users and connections.
- Link to free trial
- https://www.dataiku.com/product/get-started/