Skip to main content

Help us improve the Digital Marketplace - send your feedback

Billigence

Dataiku

Dataiku is a comprehensive data science and machine learning platform that enables collaborative, enterprise-ready analytics. It offers no-code/low-code capabilities, scalable computing, broad integration, and easy operationalization of analytical solutions with governance and explain-ability features.

Features

  • Data preparation
  • Model building, deployment and monitoring
  • Visual drag and drop interfaces
  • DataOps
  • Governance
  • Machine learning
  • Automated data pipelines, model training and documentation
  • Monitoring and alerting to ensure health of deployed models
  • Explainable AI

Benefits

  • End-to-End Analytics Platform
  • Broad Integration Capabilities
  • No-Code/Low-Code Capabilities
  • Collaborative and Enterprise-Ready
  • Scalable and Distributed Computing
  • Governance and Explain-ability
  • Operationalization and Deployment

Pricing

£101,430 an instance

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at michael.evans@billigence.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

6 0 2 9 0 5 4 3 2 1 7 2 1 5 9

Contact

Billigence Michael Evans
Telephone: 07951 391 823
Email: michael.evans@billigence.com

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints
No particular constraints.
System requirements
Modern Internet browsers

User support

Email or online ticketing support
Email or online ticketing
Support response times
Dataiku will adhere to the Service Level Agreement (SLA), if any, specified on each applicable Order.
User can manage status and priority of support tickets
No
Phone support
No
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Dataiku will adhere to the Service Level Agreement (SLA), if any, specified on each applicable Order.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Billigence has a team of Dataiku accredited data engineers can perform initial setup of your Dataiku instance, configure data connections and outputs and set up some example models and provide training.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Source data is not retained within Dataiku platform.

Trained models can be exported from Dataiku in XML format at any time during the contract.
End-of-contract process
At the end of the contract the licences expire, users are no longer able to log in and access the service. After a 7 day grace period, any data held is deleted.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
Application to install
No
Designed for use on mobile devices
No
Service interface
Yes
User support accessibility
None or don’t know
Description of service interface
Matillion is an enterprise data integration platform. These platforms typically provide a web-based user interface for managing and administering the service. This interface would be accessible by authorized users, likely including administrators.
Administrative tasks require access to configuration and settings. Some tasks that might require an admin interface include managing user accounts and permissions, configuring data sources and destinations, setting up schedules for data flows, and monitoring job execution.
Accessibility standards
None or don’t know
Description of accessibility
The Dataiku platform is currently partially compliant with WCAG 2.1A and benefits from browser accessibility features as a web-based application.
Accessibility testing
Available upon request.
API
Yes
What users can and can't do using the API
Python API - for more information please refer to: https://doc.dataiku.com/dss/latest/python-api/index.html

R API - for more information please refer to: https://doc.dataiku.com/dss/latest/R-api/index.html

Public REST API - for more info please refer to:
https://doc.dataiku.com/dss/latest/publicapi/index.html

Javascript API for webapps - for more info please refer to:
https://doc.dataiku.com/dss/latest/api/index.html

The Scala API, for documentation please refer to:
https://doc.dataiku.com/dss/api/12/scala
API documentation
Yes
API documentation formats
  • HTML
  • PDF
  • Other
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Integration with customer tools and systems as it support wide scale of data sources connection, ML, business intelligence, customer internal systems and API.

Adjustment of user interface - visual and user environment, colour scheme, icons, components layout, etc.

Extension with customer development and plug ins to extend its nationality, development of customer tools, workflows and analysis which are based on customer specific needs.

User access management and roles.

Automation and orchestration.

Scaling

Independence of resources
Each customer is assigned a dedicated Dataiku backend application running in a container on a Kubernetes
cluster with strict network policies and a least privilege policy. Additionally, Dataiku application customer data
is logically segregated within AWS and stored on a dedicated EBS volume only accessible by the customer's
dedicated backend.

Analytics

Service usage metrics
Yes
Metrics types
DSS acts as the central orchestrator of many computation resources, from SQL databases to Kubernetes. Through DSS, users can leverage these elastic computation resources and consume them. It is thus very important to be able to monitor and report on the usage of computation resources, for total governance and cost control of your Elastic AI stack.

DSS includes a complete stack for reporting and tagging compute resources. The data gathered through this stack is sent through the audit centralization mechanism and can be analyzed centrally (across multiple DSS instances) using DSS. Dashboards can be built from there.

Resellers

Supplier type
Reseller providing extra support
Organisation whose services are being resold
Dataiku

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Other
Other data at rest protection approach
Dedicated, encrypted EBS volumes for each customer.
Encrypted cloud storage for processed data (optional).
Encrypted central database for customer subscriptions.
Customer-sensitive information further encrypted for extra protection.
Customers can choose storage region and connect their own storage (their responsibility).
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
There are several ways how to export data from Dataiku, all listed below.
Data export formats
  • CSV
  • Other
Other data export formats
  • XLSX
  • JSON
  • Python
  • ML flow model
  • Jupyter notebook
  • Snowflake function
Data import formats
  • CSV
  • Other
Other data import formats
  • JSON
  • Relational or analytical database

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Other
Other protection between networks
Dataiku operated with shared security responsibility and connection between Dataiku Cloud and the user is under responsibility of Dataiku, who is always using HTTPS, which protects data-in-transit using Transport Layer Security (TLS) by providing authentication and privacy and integrity of data exchanged. These connections always utilize
TLS1.2 or higher,
Connections between Dataiku Cloud and customer´s data are customer´s responsibility, Dataiku supports integration with encrypted solutions which comply with customer requirements.
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Other
Other protection within supplier network
Dataiku utilizes tools such as AWS Web Application Firewall (WAF), which protects Dataiku Cloud from web
exploits, and AWS GuardDuty, which detects and monitors for compromised accounts, anomalous behavior,
and malware. Which provides a properly secured perimeter. Alerts are generated for any irregular
activity,depending on the criticality of the associated assets, these alerts are escalated to the Site
Reliability Engineering (SRE) team to assess whether actions are needed. The SRE carefully plans and
reviews the threshold or logic that triggers these alerts regularly. The SRE monitors the
performance of these tools and responds as necessary to protect against these threats.

Availability and resilience

Guaranteed availability
Dataiku Cloud benefits from the high availability targets and service level agreements AWS provides to deliver
the services. The Dataiku Cloud Service Reliability Engineering Team continuously monitors these availability
targets to ensure our customers enjoy the guaranteed availability targets specified within our Service Level
Agreements.
Approach to resilience
Where a Dataiku VM is hosted in the cloud, it relies primarily on the resilience of the hosting cloud platform.
Outage reporting
This is dependent on availability of the Cloud service.
All backups are managed by our cloud providers and are encrypted. Dataiku DSS data (project configuration,
recipes, notebook, etc.) is backed up every 6 hours. This backup is executed leveraging AWS EBS snapshot and
monitored closely. Backups have at least four days of retention and upto3months.Theretentionperiodvaries
with the Dataiku Cloud edition. All backups are retained by AWS.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password
  • Other
Other user authentication
Dataiku customers have the option to bring their own identity provider via SAML v2 integration. In that case, all
password policies, along with MFA requirements, remain under our customerʼs governance and control.
Access restrictions in management interfaces and support channels
Unless access is needed for regular maintenance to ensure Dataiku Cloudʼs security and performance, Dataiku
will not access customer data without explicit consent from the customer. This access is only granted to a
limited group of individuals within Dataiku and is closely monitored and audited. Additionally, access is only
available under Multi-Factor Authentication (MFA). Virtual Private Network (VPN) is also needed to access critical
administrative areas of Dataiku Cloud. Our customers can also grant or deny the Dataiku Support teamaccess
for technical support interactions by clicking an approval button.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Other
Description of management access authentication
Dataiku customers have the option to bring their own identity provider via SAML v2 integration. In that case, all password policies, along with MFA requirements, remain under our customerʼs governance and control.

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
Schellman Compliance, LLC
ISO/IEC 27001 accreditation date
27/7/2023
What the ISO/IEC 27001 doesn’t cover
Certification covers any main parts of the processes.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
Yes
Any other security certifications
  • ISO 27701
  • SOC2TypeII

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Dataiku follows all processes up to the certified standards.

For further information please refer to:
https://doc.dataiku.com/dss/latest/security/index.html

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Dataiku has a change management procedure to ensure changes to Dataiku products and services are
implemented consistently with clearly defined roles and responsibilities. All changes to our product are strictly
controlled. Change requests for our products are tracked using a change tracker, where progress, status, and
approvals are recorded prior to each release. Steps in the change management process include:
-Creation of Change request
-Change Categorisation and Assessment
-Testing of Change
-Aproval of Change
-Release commitment
-System Change Logs
The Dataiku issues notification for scheduled maintenance with a system-wide banner or email notification at least 2 days in advance.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Dataiku has a vulnerability management program actively managed by the Dataiku Cloud team, leveraging
industry-standard tools and internal capabilities. Vulnerability scans are performed regularly. Dataiku
proactively manages security risks through vulnerability scans and follow-up remediation efforts. Dataiku also
continually reviews patches and updates, where relevant, as they are released to determine criticality and
impact on Dataiku offerings.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
The logging mechanism is monitored by an independent component that leverages a metric collection and alerting system. Depending on the criticality of the associated assets, alerts are triggered to the SRE Team to assess whether an action is needed.Escalations,if any,are reviewed on a 24/7 basis.Carefully planed and reviewed are threshold that triggers these alerts on a regular basis. Once an alert is raised,SRE team follows our Standard alert response
procedure.
Other than basic PII information needed for logging and auditing purposes, Dataiku does not store sensitive information on logs. Logs are properly retained in accordance with Dataikuʼs Records Retention
Schedules.
Incident management type
Supplier-defined controls
Incident management approach
When an incident is reported,the incident response plan is triggered with an initial responder from the Dataiku Cloud support team assigned.The responder assembles an incident response team relevant to the type and
severity of the incident.The team reviews the details provided for the incident and obtains more information from the reporter if necessary.The team then assigns a classification ranging from Critical to Low,depending on the severity and impact of the incident,and reports the status regularly,escalates when required.External communication,if applicable,will be made available per our contractual and regulatory obligations.Our customers can report suspected incidents via Dataikuʼs self-service Intercom portal or email.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Equal opportunity

Fighting climate change

We endeavour to do our best in fighting climate change and have made an active effort to switch our delivery to remote working vs onsite delivery where possible, thus reducing our travel & impact on the environment.

Equal opportunity

Being an equal opportunity employer cultivates a workplace where diversity is embraced and valued. It fosters inclusivity, ensuring all individuals have fair opportunities for employment and advancement regardless of race, gender, age, religion, or background. By prioritizing diversity and inclusion, organizations harness the full spectrum of human potential, driving innovation, creativity, and problem-solving. Embracing equality in employment not only reflects ethical responsibility but also enriches company culture, improves employee morale, and enhances productivity. Ultimately, as a social value, being an equal opportunity employer promotes fairness, equity, and respect, contributing to a more just and harmonious society.

Pricing

Price
£101,430 an instance
Discount for educational organisations
No
Free trial available
Yes
Description of free trial
Limitation in number of users and connections.
Link to free trial
https://www.dataiku.com/product/get-started/

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at michael.evans@billigence.com. Tell them what format you need. It will help if you say what assistive technology you use.