Securium-Discover : Open-source information capture and data extraction
Securium-Discover is the “shazam of content-finding” (text and image) using targeted intelligence-gathering and machine learning to for information capture and data extraction – whether in whole or in parts (online and offline). It tracks information including dissemination of terrorist material, finds copies of product descriptions indicating counterfeits, and more.
Features
- Fast search and rapid triage of unlinked online content.
- Topic and domain independent intelligence extraction.
- Operating in 42 languages.
- Hate, tone, and sentiment analysis.
- Image analysis for exact and similar images.
- Results ranked by threat level.
- Simplified result presentation and reporting for in-depth investigations.
- Easy to use interface.
- Integrates with forensic analysis systems such as i2 Analyst’s Notebook.
- Analysis over 2K website in 1 hour as regular search
Benefits
- Offers exhaustive discovery, eliminating the need for costly manual curation.
- Speeds up detection and enables prevention and evidence collection.
- Results are presented in severity order to prioritise investigations.
- Configurability of scan size, supporting shallow and deep discovery.
- Direct comparisons between input data and external content.
- Side-by-side comparison of input and discovered data.
- Allows export of results (Excel/JSON/HTML) for onward distribution.
- Scheduled automatic reruns, offering the most recent matches for content.
- Finds key disseminators of harmful content, identifies echo chamber, etc.
- Visualisation of outcomes.
Pricing
£15,000 to £500,000 a licence a year
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
7 4 3 1 1 6 0 2 3 8 0 1 7 4 1
Contact
Securium Ltd
Securium's G-Cloud team
Telephone: -
Email: gcloud@securium.co.uk
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- Would vary depending on buyers existing capabilities.
- Cloud deployment model
-
- Public cloud
- Private cloud
- Service constraints
- Any buyer-specific hardware configurations would need to be known for private cloud deployment.
- System requirements
-
- Scalable computational provision in both compute and storage (infrastructure provision)
- Ease of connectivity to data sources
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Typically within 48 hours on working days, depending on the service needs within the question. Weekend support can be provided at extra cost.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Yes, at an extra cost
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- A common web chat system, suited to the customer, will be offered.
- Web chat accessibility testing
- N/A
- Onsite support
- Yes, at extra cost
- Support levels
- Securium’s normal support hours are 9.00am - 5.00pm Monday to Friday excluding Holidays. Support levels are flexible and the company can tailor a package to meet customer requirements.
- Support available to third parties
- No
Onboarding and offboarding
- Getting started
- On-boarding support is flexible and can be customised to meet the buyers need. This can include onsite integration work, user training and full user documentation.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- Users will extract data via the API provided.
- End-of-contract process
- Account would expire automatically
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- Details
- Accessibility standards
- None or don’t know
- Description of accessibility
- Details needed
- Accessibility testing
- Details needed
- API
- Yes
- What users can and can't do using the API
- API is set up for users to connect to the system and upload content for analysis.
- API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
- We can work with buyers to customise the system.
Scaling
- Independence of resources
- Provision can be made by defining tenanting arrangements.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Details of service metrics can be provided on request.
- Reporting types
-
- API access
- Real-time dashboards
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- Less than once a year
- Penetration testing approach
- In-house
- Protecting data at rest
- Other
- Other data at rest protection approach
- Data are encrypted.
- Data sanitisation process
- No
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Data exported via the API.
- Data export formats
-
- CSV
- Other
- Other data export formats
- JSON
- Data import formats
- Other
- Other data import formats
- JSON
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- Other
- Other protection within supplier network
- There are no further service connections within the application.
Availability and resilience
- Guaranteed availability
- Dependent on the customer's needs and requirements and cost.
- Approach to resilience
- Details available on request
- Outage reporting
- Email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Username or password
- Other
- Other user authentication
- Details provided on request.
- Access restrictions in management interfaces and support channels
- User access is determined based on buyers’ need.
- Access restriction testing frequency
- Less than once a year
- Management access authentication
-
- Username or password
- Other
- Description of management access authentication
- Access should be governed by integrating systems.
Audit information for users
- Access to user activity audit information
- No audit information available
- Access to supplier activity audit information
- No audit information available
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- Securium has security in the core of its technical design, operation, deployment and customer engagement. More details can be provided on request.
- Information security policies and processes
- Details of Securium’s policies and processes can be provided on request.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Details on request.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Details on request.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Details on request.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Details on request.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
WellbeingWellbeing
Securium-Discover can reduce the load on investigators, analysts and moderators by automatically detecting ‘harmful content’ thus reducing human exposure to such material to only that necessary, positively impacting on workplace wellbeing and helping to tackle stress-related mental ill-health.
Pricing
- Price
- £15,000 to £500,000 a licence a year
- Discount for educational organisations
- No
- Free trial available
- No