Hosting for Generative AI
A platform for hosting Generative AI. Drive economies for hosting and token use across Azure, AWS and Google Cloud. Align with GenAIOps best-practice.
Features
- GenAI Landing Zone
- GenAI Cloud Optimization
- GenAIOps Well-Architected Framework
- GenAIOps aligned
Benefits
- Secure implementation
- Enhanced environmental sustainability
- Cost reduction
- Proven pathway
- Observable AI
- Capability improvement
- Contextual to each use-case
- User-centric AI design
Pricing
£500 to £500,000 a licence a month
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
7 2 0 7 1 9 9 3 9 1 7 1 8 4 1
Contact
GREAT WAVE AI LIMITED
Harrison Kirby
Telephone: 07496841649
Email: harrison@greatwave.ai
Service scope
- Service constraints
- Nil
- System requirements
-
- Microsoft Edge
- Firefox
- Google Chrome
- Safari
User support
- Email or online ticketing support
- Yes, at extra cost
- Support response times
- Within 1 working day weekday and weekends
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), 7 days a week
- Web chat support
- Yes, at an extra cost
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- WCAG 2.1 A
- Web chat accessibility testing
- Nil
- Onsite support
- Yes, at extra cost
- Support levels
- Support levels are use case and client dependent
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Full in-person hypercare to establish approach, architecture, service levels and ongoing support. Subject to contract
- Service documentation
- Yes
- Documentation formats
- HTML
- End-of-contract data extraction
- Via CSV
- End-of-contract process
- All transition services and additional support required by end of contract are procured by the client at additional cost in line with pre-agreed day rates.
Using the service
- Web browser interface
- Yes
- Using the web interface
- Allows users to build, manage and monitor gen AI agents
- Web interface accessibility standard
- WCAG 2.1 A
- Web interface accessibility testing
- Nil
- API
- Yes
- What users can and can't do using the API
- All features available through API
- API automation tools
-
- Ansible
- Chef
- OpenStack
- SaltStack
- Terraform
- Puppet
- API documentation
- Yes
- API documentation formats
- HTML
- Command line interface
- No
Scaling
- Scaling available
- Yes
- Scaling type
- Automatic
- Independence of resources
- All services are under-pinned by hyperscale cloud providers.
- Usage notifications
- No
Analytics
- Infrastructure or application metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- No
- Equipment disposal approach
- A third-party destruction service
Backup and recovery
- Backup and recovery
- No
Data-in-transit protection
- Data protection between buyer and supplier networks
- Private network or public sector network
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
99.9% availability during working hours
99% availability outside of working hours - Approach to resilience
- Resilience is delivered by a hybrid cloud approach and aligned to well-architected framework
- Outage reporting
- Email alerts
Identity and authentication
- User authentication
-
- Public key authentication (including by TLS client certificate)
- Username or password
- Access restrictions in management interfaces and support channels
- N/A
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- Public key authentication (including by TLS client certificate)
- Username or password
- Devices users manage the service through
- Directly from any device which may also be used for normal business (for example web browsing or viewing external email)
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- Cyber essentials
- Information security policies and processes
- DevSecOps and Cyber essentials
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- ITIL 4 best practice
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- ITIL 4 best practice
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Use Microsoft Azure's security technology
- Incident management type
- Supplier-defined controls
- Incident management approach
- ITIL 4 best practice
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- No
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
- Through Microsoft
Social Value
- Social Value
-
Social Value
- Tackling economic inequality
- Equal opportunity
Tackling economic inequality
40% of our workforce are recruited from ethinic minorities within social disadvantaged backgrounds. We use the government's bootcamp scheme to secure this talent.Equal opportunity
40% of our workforce are recruited from ethinic minorities within social disadvantaged backgrounds. We use the government's bootcamp scheme to secure this talent.
Pricing
- Price
- £500 to £500,000 a licence a month
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- All features included but time and use volumes limited