Helix Enterprise Search
Helix is designed to provide a “search engine like” experience to organisations wishing to search their internal data. It uses machine learning to help make better use of unstructured data. It provides novel search, matching, spatial proximity, clustering, classification, analytics and graph database technology in one solution.
Features
- Repository based design
- Federated Search
- Supports most common file formats
- Provides NLP enrichment and spatial enrichment
- Provides simple data mining features and data extraction algorithms
- Provides machine learning for improved search and matching results
- Supports spatial search
- Extracts Knowledge to Graph Database
- Provides Graph Database visualisation and editing
Benefits
- An ability to search across multiple datasets concurrently
- An ability to search documents by location
- Improved search results through Vector Space Modelling
- Ability to tag, classify and cluster data
- Ability to visualise extracted graph data
Pricing
£300 to £5,000 an instance a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
6 7 4 8 9 3 3 9 9 0 8 1 0 0 4
Contact
Symilarity Ltd
Julian Oates
Telephone: 07513408556
Email: sales@symilarity.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
-
We reserve the right to a 4 hour downtime period once per month. This would normally be undertaken at a time that minimises the inconvenience to users. This will be ascertained during the ordering process.
If you wish to use spatial enrichment or Watson NLU, you will need to provide keys for these services. Keys can be provided at an additional cost based upon usage of these APIs - System requirements
-
- Symilarity is accessed through most common web browsers
- API key for Google/Bing Maps (if auto geocoding functionality used)
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Support is provided during UK office hours, Monday to Friday, excluding public holidays. Support requests should be sent by email to support@symilarity.com detailing the problem and providing contact details. Support is provided on a fair usage basis.
- User can manage status and priority of support tickets
- No
- Phone support
- No
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Support is provided during UK office hours, Monday to Friday, excluding public holidays. Support requests should be sent by email to support@symilarity.com detailing the problem and providing contact details. Support is provided on a fair usage basis.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Symilarity's Enterprise Search software is designed for non-specialist users and does not require lengthy training. However, every service installation includes one web based introductory session of half a day, to provide an overview of the application and get users started.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- Users can download documents at any time during the term of the service, so no final data export is included as standard. However, this is an additional service that can be purchased at the outset.
- End-of-contract process
- Documents ingested by the software are assumed to be copies of master documents held by the client and so no specific provision to return documents is included in the contract. However, this service can be provided at the rates specified in the rate card.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
- Users can search data using all features available within the UI. Users can post new documents in plain text or xml format.
- API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- No
- Customisation available
- No
Scaling
- Independence of resources
- Helix instances are deployed on a single tenanted virtual machine.
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- Less than once a year
- Penetration testing approach
- In-house
- Protecting data at rest
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- Many functions within the Intelligent Search and Matching software enable data to be exported. Documents ingested in plain text, PDF or MS Powerpoint formats can be downloaded on a document by document basis. Documents ingested as CSV or XML cannot be downloaded in the same way but it is assumed that the user has retained the master documents.
- Data export formats
-
- CSV
- Other
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- Html
- PDF/A
- XML
- RSS
- MS Word
- Plain Text
- Mhtl
- Excel
- PowerPoint
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
Unless stated, Symilarity will provide its software hosted on Amazon AWS servers based in the UK. Clients are requested to ensure that AWS provides availability levels that meet their requirement.
In the event that a server has been offline for more than a 24 hour period, Symilarity will provide a service credit equal to the amount of the saving on hosting cost. - Approach to resilience
-
In the standard solution, Symilarity is assumed to contain no “master data”. All data contained within Symilarity is only a copy of data held elsewhere by the user. Therefore, the Standard installations are provided with no specific built in redundancy. Database backups are taken daily. Recovery of a lost server would require restoring data from the last backup. Data added since the last backup would be lost.
Where Symilarity is used for operational purposes (e.g. document matching or search via API queries), there is a need for increased redundancy and smaller recovery point objectives. It is likely that these solutions will need to be tailored to specific requirements. However, they would be built from server types on the price list. - Outage reporting
- Symilarity will provide an email alert if it detects a service outage.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Username or password
- Other
- Other user authentication
- Users authenticate via username and password. Additionally, if required, user access can be restricted by IP address
- Access restrictions in management interfaces and support channels
-
Users authenticate via username and password. Additionally, if required, user access can be restricted by IP address.
Permissions are used to grant users access to specific datasets and functionality. The system administrator manages permissions. - Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- Username or password
- Other
- Description of management access authentication
- Administrator access is protected by username and password but can additionally be restricted to IP address.
Audit information for users
- Access to user activity audit information
- No audit information available
- Access to supplier activity audit information
- No audit information available
- How long system logs are stored for
- Less than 1 month
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
-
Symilarity adopts a "security by design" approach.
Security governance is overseen by a Director. This extends to design considerations, day to day operations through the lifecycle.
Client systems are provided on single tenanted machines to ensure data cannot be accessed by other users
The software provides permissions on a repository basis.
Data is encrypted at rest. - Information security policies and processes
- All work undertaken has to be signed off by a director. The director is responsible for ensuring the appropriate policies are enforced.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- All components are version numbered. Configuration changes are assessed for the potential impact and tested accordingly.
- Vulnerability management type
- Undisclosed
- Vulnerability management approach
- Threats are assessed against their potential impact and likelihood. Patches are deployed monthly.
- Protective monitoring type
- Undisclosed
- Protective monitoring approach
- We use a combination of our own monitoring and client reporting to identify potential compromises. If a suspected compromise is identified, this will be assessed immediately. Depending upon that assessment, the service may be closed until further investigation is completed.
- Incident management type
- Supplier-defined controls
- Incident management approach
-
Users can report incidents to support@symilarity.com. Incidents will be logged and investigated. Further information may be requested from the user if required. Resolutions for common events will be provided and may be posted online.
Incidents/Outages will be reported to impacted clients via email.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Helix from Symilarity is a search and analysis tool that enables users to understand data and find data easily. This reduces the effort required to complete tasks. This reduces the effort required to complete tasks and improves organisational efficiency. Helix is delivered using Virtual machines, allowing hosting providers to optimise usage of their hardware provision, reducing the need to manufacture hardware. Service delivery using SaaS enables employers to offer hybrid working, reducing the requirement to travel to the office.Covid-19 recovery
Helix from Symilarity is a search and analysis tool that enables users to understand data and find data easily. This reduces the effort required to complete tasks and improves organisational efficiency.
Intelligent Search and Matching is delivered using Virtual machines, allowing hosting providers to optimise usage of their hardware provision, reducing the need to manufacture hardware. Service delivery using SaaS enables employers to offer hybrid working, reducing the requirement to travel to the office.Tackling economic inequality
Helix from Symilarity is a search and analysis tool that enables users to understand data and find data easily. For instance, it could be used to analyse a document corpus relating to jobseekers or deprivation, which might illustrate whether targeted support could be given to specific groups, rather than just everyone. Helix aims to democratise the use of AI/Machine Learning by providing ready to use applications that can be re-trained without any programming skills.Equal opportunity
Helix is an analysis tool that enables users to understand and search data. For instance, looking at data relating to inequality, using a geographic perspective would illustrate whether targeted support could be given to specific neighbourhoods, rather than just everyone. Helix aims to democratise the use of AI/Machine
Learning by providing ready to use applications that can be re-trained without any programming skills.Wellbeing
Helix is an analysis tool that enables users to understand and search data. For instance, it was used to review and analyse a large number of research papers relating to the Human Gut Biome. It assisted
the identification foods that improved the Human Gut Biome which lead to an improvement in health. Intelligent Search and Match software is delivered on a SaaS basis, enabling employers to offer hybrid working, where this aids the well-being of their employees.
Pricing
- Price
- £300 to £5,000 an instance a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- The free trial provides access to the demonstration system with reduced privileges. More extensive trials would be provided using a monthly subscription using a small instance.
- Link to free trial
- https://symilarity.ai/free-trial/