Skip to main content

Help us improve the Digital Marketplace - send your feedback

Symilarity Ltd

Helix Enterprise Search

Helix is designed to provide a “search engine like” experience to organisations wishing to search their internal data. It uses machine learning to help make better use of unstructured data. It provides novel search, matching, spatial proximity, clustering, classification, analytics and graph database technology in one solution.

Features

  • Repository based design
  • Federated Search
  • Supports most common file formats
  • Provides NLP enrichment and spatial enrichment
  • Provides simple data mining features and data extraction algorithms
  • Provides machine learning for improved search and matching results
  • Supports spatial search
  • Extracts Knowledge to Graph Database
  • Provides Graph Database visualisation and editing

Benefits

  • An ability to search across multiple datasets concurrently
  • An ability to search documents by location
  • Improved search results through Vector Space Modelling
  • Ability to tag, classify and cluster data
  • Ability to visualise extracted graph data

Pricing

£300 to £5,000 an instance a month

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at sales@symilarity.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

6 7 4 8 9 3 3 9 9 0 8 1 0 0 4

Contact

Symilarity Ltd Julian Oates
Telephone: 07513408556
Email: sales@symilarity.com

Service scope

Software add-on or extension
No
Cloud deployment model
Private cloud
Service constraints
We reserve the right to a 4 hour downtime period once per month. This would normally be undertaken at a time that minimises the inconvenience to users. This will be ascertained during the ordering process.

If you wish to use spatial enrichment or Watson NLU, you will need to provide keys for these services. Keys can be provided at an additional cost based upon usage of these APIs
System requirements
  • Symilarity is accessed through most common web browsers
  • API key for Google/Bing Maps (if auto geocoding functionality used)

User support

Email or online ticketing support
Email or online ticketing
Support response times
Support is provided during UK office hours, Monday to Friday, excluding public holidays. Support requests should be sent by email to support@symilarity.com detailing the problem and providing contact details. Support is provided on a fair usage basis.
User can manage status and priority of support tickets
No
Phone support
No
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Support is provided during UK office hours, Monday to Friday, excluding public holidays. Support requests should be sent by email to support@symilarity.com detailing the problem and providing contact details. Support is provided on a fair usage basis.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Symilarity's Enterprise Search software is designed for non-specialist users and does not require lengthy training. However, every service installation includes one web based introductory session of half a day, to provide an overview of the application and get users started.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
Users can download documents at any time during the term of the service, so no final data export is included as standard. However, this is an additional service that can be purchased at the outset.
End-of-contract process
Documents ingested by the software are assumed to be copies of master documents held by the client and so no specific provision to return documents is included in the contract. However, this service can be provided at the rates specified in the rate card.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
No
Service interface
No
User support accessibility
None or don’t know
API
Yes
What users can and can't do using the API
Users can search data using all features available within the UI. Users can post new documents in plain text or xml format.
API documentation
Yes
API documentation formats
PDF
API sandbox or test environment
No
Customisation available
No

Scaling

Independence of resources
Helix instances are deployed on a single tenanted virtual machine.

Analytics

Service usage metrics
No

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
Less than once a year
Penetration testing approach
In-house
Protecting data at rest
Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Many functions within the Intelligent Search and Matching software enable data to be exported. Documents ingested in plain text, PDF or MS Powerpoint formats can be downloaded on a document by document basis. Documents ingested as CSV or XML cannot be downloaded in the same way but it is assumed that the user has retained the master documents.
Data export formats
  • CSV
  • Other
Data import formats
  • CSV
  • Other
Other data import formats
  • Html
  • PDF/A
  • XML
  • RSS
  • MS Word
  • Plain Text
  • Mhtl
  • Excel
  • PowerPoint

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Unless stated, Symilarity will provide its software hosted on Amazon AWS servers based in the UK. Clients are requested to ensure that AWS provides availability levels that meet their requirement.

In the event that a server has been offline for more than a 24 hour period, Symilarity will provide a service credit equal to the amount of the saving on hosting cost.
Approach to resilience
In the standard solution, Symilarity is assumed to contain no “master data”. All data contained within Symilarity is only a copy of data held elsewhere by the user. Therefore, the Standard installations are provided with no specific built in redundancy. Database backups are taken daily. Recovery of a lost server would require restoring data from the last backup. Data added since the last backup would be lost.

Where Symilarity is used for operational purposes (e.g. document matching or search via API queries), there is a need for increased redundancy and smaller recovery point objectives. It is likely that these solutions will need to be tailored to specific requirements. However, they would be built from server types on the price list.
Outage reporting
Symilarity will provide an email alert if it detects a service outage.

Identity and authentication

User authentication needed
Yes
User authentication
  • Username or password
  • Other
Other user authentication
Users authenticate via username and password. Additionally, if required, user access can be restricted by IP address
Access restrictions in management interfaces and support channels
Users authenticate via username and password. Additionally, if required, user access can be restricted by IP address.

Permissions are used to grant users access to specific datasets and functionality. The system administrator manages permissions.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • Username or password
  • Other
Description of management access authentication
Administrator access is protected by username and password but can additionally be restricted to IP address.

Audit information for users

Access to user activity audit information
No audit information available
Access to supplier activity audit information
No audit information available
How long system logs are stored for
Less than 1 month

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
Symilarity adopts a "security by design" approach.

Security governance is overseen by a Director. This extends to design considerations, day to day operations through the lifecycle.

Client systems are provided on single tenanted machines to ensure data cannot be accessed by other users
The software provides permissions on a repository basis.
Data is encrypted at rest.
Information security policies and processes
All work undertaken has to be signed off by a director. The director is responsible for ensuring the appropriate policies are enforced.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
All components are version numbered. Configuration changes are assessed for the potential impact and tested accordingly.
Vulnerability management type
Undisclosed
Vulnerability management approach
Threats are assessed against their potential impact and likelihood. Patches are deployed monthly.
Protective monitoring type
Undisclosed
Protective monitoring approach
We use a combination of our own monitoring and client reporting to identify potential compromises. If a suspected compromise is identified, this will be assessed immediately. Depending upon that assessment, the service may be closed until further investigation is completed.
Incident management type
Supplier-defined controls
Incident management approach
Users can report incidents to support@symilarity.com. Incidents will be logged and investigated. Further information may be requested from the user if required. Resolutions for common events will be provided and may be posted online.

Incidents/Outages will be reported to impacted clients via email.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

Helix from Symilarity is a search and analysis tool that enables users to understand data and find data easily. This reduces the effort required to complete tasks. This reduces the effort required to complete tasks and improves organisational efficiency. Helix is delivered using Virtual machines, allowing hosting providers to optimise usage of their hardware provision, reducing the need to manufacture hardware. Service delivery using SaaS enables employers to offer hybrid working, reducing the requirement to travel to the office.

Covid-19 recovery

Helix from Symilarity is a search and analysis tool that enables users to understand data and find data easily. This reduces the effort required to complete tasks and improves organisational efficiency.
Intelligent Search and Matching is delivered using Virtual machines, allowing hosting providers to optimise usage of their hardware provision, reducing the need to manufacture hardware. Service delivery using SaaS enables employers to offer hybrid working, reducing the requirement to travel to the office.

Tackling economic inequality

Helix from Symilarity is a search and analysis tool that enables users to understand data and find data easily. For instance, it could be used to analyse a document corpus relating to jobseekers or deprivation, which might illustrate whether targeted support could be given to specific groups, rather than just everyone. Helix aims to democratise the use of AI/Machine Learning by providing ready to use applications that can be re-trained without any programming skills.

Equal opportunity

Helix is an analysis tool that enables users to understand and search data. For instance, looking at data relating to inequality, using a geographic perspective would illustrate whether targeted support could be given to specific neighbourhoods, rather than just everyone. Helix aims to democratise the use of AI/Machine
Learning by providing ready to use applications that can be re-trained without any programming skills.

Wellbeing

Helix is an analysis tool that enables users to understand and search data. For instance, it was used to review and analyse a large number of research papers relating to the Human Gut Biome. It assisted
the identification foods that improved the Human Gut Biome which lead to an improvement in health. Intelligent Search and Match software is delivered on a SaaS basis, enabling employers to offer hybrid working, where this aids the well-being of their employees.

Pricing

Price
£300 to £5,000 an instance a month
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
The free trial provides access to the demonstration system with reduced privileges. More extensive trials would be provided using a monthly subscription using a small instance.
Link to free trial
https://symilarity.ai/free-trial/

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at sales@symilarity.com. Tell them what format you need. It will help if you say what assistive technology you use.