Skip to main content

Help us improve the Digital Marketplace - send your feedback

RISING TIDE AI LTD

Intelligent automation and AI solutions

Rising Tide AI provides solutions and services that help organisations take advantage of AI and automation. Solutions that are pre-built for fast configuration and deployment or as a starting point for a bespoke solution. These include email filing, automated processes, document reading and drafting, QA Targeting and data capture.

Features

  • Analysis of business problems and identification of solution opportunities
  • Proof of Concept (POC) approach
  • Pre-built AI and automation solutions using leading AI tools
  • Configuration of solutions for bespoke business problems
  • Chatbot capabilities to enhance automation and customer engagement
  • Intelligent orchestration, scheduling, workflow and management tools
  • Simple and complex decision-making functionality
  • Rapid deployment of managed service and scaling on demand
  • Natural Language Processing for document analysis
  • Large Language Models to interpret information and communications

Benefits

  • Increase process and workforce efficiencies
  • Enhance productivity by being able to do more with less
  • Improve customer service by responding and completing requests quickly
  • Manage customer experience by providing services more consistently
  • Reduce operating expenditure
  • Managed service solutions that quickly deliver return on investment
  • Increase accuracy and improve compliance
  • Create greater resilience to deal with spikes in demand

Pricing

£500 to £10,000 a licence a month

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at iain.mckeith@rising-tide.ai. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

8 4 4 1 7 6 6 1 6 1 4 8 9 7 2

Contact

RISING TIDE AI LTD Iain McKeith
Telephone: 07555765647
Email: iain.mckeith@rising-tide.ai

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
Service constraints
No. Our solutions are designed from the outset with error monitoring, and the ability to perform any necessary maintenance and updates in mind. Seamless updates with no downtime are a core component of our services.
System requirements
None

User support

Email or online ticketing support
Email or online ticketing
Support response times
Our standard SLAs and service support can be adjusted to meet individual organisation's needs up to a 24/7/365 support model. Initial response time varies depending on the specific tier of support purchased.

Our standard support offers an initial response time of 4 business hours for severity 1 issues
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Standard Support - Monday - Friday - 9.00am - 5.00pm

We can provide bespoke enhanced support options at an extra cost up to a complete support model that provides 24/7/365 support cover.

All of our customers are assigned a named business account manager and technical account manager.

Account managers perform periodic reviews of the service offering and its ongoing performance and act as first point of escalation should the need arise.
Support available to third parties
No

Onboarding and offboarding

Getting started
Workshops or conference calls are typically held to work through the solution and help the client team understand the rationale, approach, functionality and underlying technology of our solution.

Training is provided either on-site or via video conference depending on requirements.

We provide end user documentation for each specific solution as well as technical documentation so that our solutions can be integrated into other technologies.

Many of our services leverage cloud-based AI and Machine Learning technologies provided by organisations such as Amazon Web Services, Microsoft and Google who also provide training and documentation for their platforms.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
In line with GDPR legislation and our role as a Data Processor, our services are designed to only store client data in a transient manner for the short period of time needed to provide the service.

Once a particular set of data is successfully processed it will be deleted from our systems and hence, we typically do not hold any client data that would require extraction at the end of a contract.

Any configuration of the systems and other associated inputs remain owned by the client at all times, and these can be extracted in accordance with the client data handling policies.

We also log information about the performance of the service. In line with good security practices, no personally identifiable information is stored in log files. Log files are available to clients to be extracted or removed at the end of the contract and can be audited at any time on request.
End-of-contract process
The specifics of the end-of-contract and any off-boarding or service migration requirements will be agreed at the start of the service.

Our standard service offering is a consumption-based service where customers pay a single recurring payment for the services provided. Should those services no longer be required, they can be removed after an agreed notice period with no further financial commitments.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Our browser-based interfaces are built either using responsive design or an alternate dedicated mobile experience where that is more appropriate. This means that there are typically no differences in functionality available through various devices, although information may need to be presented or rendered in a different way due to certain device limitations such as screen size.
Service interface
Yes
User support accessibility
WCAG 2.1 A
Description of service interface
In order to monitor the ongoing performance of business processes and technology components within the managed service that we provide, we provide a service interface to provide near real-time information for most of our solutions.
Accessibility standards
WCAG 2.1 A
Accessibility testing
We test our software using a variety of screen readers and browsers. We are able to advise customers on the best combination of screen reader and browser technologies for each of our individual solutions.
API
Yes
What users can and can't do using the API
Many of our services are designed to enhance existing business processes and applications with Artificial Intelligence and Machine Learning.

Those services are typically accessed via a secure API that we provide. Each customer will be provided with their own unique access credentials to securely access the API.

When the core service is being delivered via API, there are no limitations other than volumetric or other usage limitations that will form part of the agreement and contract.
API documentation
Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
  • Other
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Our AI and automation solutions are pre-built and available to be used with little to no customisation. However, customers can also customise our solutions in order to meet their organisation's individual requirements.

Scaling

Independence of resources
The solutions and services are built using leading AI platforms provided by Amazon Web Services, Microsoft Azure and Google Cloud.

By utilising industry-leading cloud providers, our solutions are designed from the outset to ensure that scalability is available on demand and peak loads from customers do not impact other customers.

Analytics

Service usage metrics
Yes
Metrics types
Different metrics are produced depending on the solution being utilised or specific requirements. By default, a dashboard is available to view metrics such as number of transactions, utilisation and activity logs.

Pre-built exception reporting is included with the platform to inform the business of any errors encountered with the business data or systems. Within our standard service offering it is not usually necessary for the business to monitor these logs as that forms part of our overall service offering.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Our solutions are designed with GDPR and other good security and privacy practices in mind. As such, any data used during the automation process is only transient and deleted upon completion. Our solutions do not store user data.

The only data we would typically hold is system logs and business rules. In line with good security practices, no personally identifiable information is stored in log files. Log files and business rules are available for client review or extraction using a variety of different formats as needed.
Data export formats
  • CSV
  • Other
Data import formats
  • CSV
  • Other

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Service level agreements and support terms will be defined with clients during the requirements gathering stage.

Our solutions are built on AI and Machine Learning capabilities provided by the industry-leading cloud providers AWS, Microsoft Azure and Google Cloud. Each has contractually guaranteed availability of at least 99.9% based on 24 x 7 availability (with some services higher). Cloud providers pay service credits if the platform fail to meet Service Level Agreements which we pass back to our clients.

As part of our standard support offer, we provided support from 9am to 5pm (UK time), Monday to Friday and manage the relationship with the cloud providers on behalf of our clients.
Approach to resilience
Our solutions are built on AI and Machine Learning capabilities provided by the industry-leading cloud providers AWS, Microsoft Azure and Google Cloud. Each of these providers publicises their own protection and resilience policies as a core tenet of their market-leading offerings.

Specifics vary by each individual provider, but each is designed with high availability, disaster recovery and backup as core capabilities. Redundancies comes at the service, data centre and regional levels.

Our services leverage the capabilities provided by these cloud vendors whilst considering GDPR and other security and privacy considerations to ensure that transient data used to provide services remains within regional boundaries (such as the UK) and that data sovereignty is well understood and implemented so that services don't 'fail over' to other regions or geographies.
Outage reporting
Outages and other issues that might affect the services that we provide to clients are available via services outages reporting and dashboards. As part of our standard services package, we offer a fully managed service which provides ongoing monitoring of services so that issues with service performance can be addressed early and typically without the need for intervention by our clients.

Identity and authentication

User authentication needed
Yes
User authentication
Username or password
Access restrictions in management interfaces and support channels
We provide Role Based Access and Privileged Identity Management to our management and support channels.

Our clients need to provide a named set of users (which can vary over time) that are allowed to access the support and management services capabilities we provide. These named users will be provided with their own access credentials for the management and support services we offer.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Access to user activity audit information
Users receive audit information on a regular basis
How long user audit data is stored for
Between 1 month and 6 months
Access to supplier activity audit information
Users receive audit information on a regular basis
How long supplier audit data is stored for
Between 1 month and 6 months
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
We adopt an organisation-wide and risk-first approach to information security.

What this means in practice is that our solutions are developed in a secure manner from the outset. Our practices include Principle of Least Privilege, data security in transit and at rest, not logging secure or personally identifiable information, regular security reviews, two-factor sign on and secure passwords for user accounts, penetration and load testing, continuous threat modelling and automated systems monitoring amongst others.

When incidents do occur, all employees as well as contractors are aware of what constitutes an incident and are familiar with the reporting procedures.
Information security policies and processes
We adopt an organisation-wide and risk-first approach to information security. Every employee as well as contractors are aware of what constitutes an incident and are familiar with the reporting procedures.

Every employee has the responsibility to report any security incidents or suspicion thereof to the Security Officer and ensure that the incident is sufficiently recorded. The Incident Management team is responsible to provide a rapid response and resume normal operation as soon as safely possible. The security incident management process is overseen by the Board who retain ultimate responsibility for security at all times.

Our security policies are built around the three principles of Confidentiality, Integrity and Availability meaning only individuals with appropriate access can access data or systems, data should remain intact and complete and users should be able to use the services provided.

We can provide more details about our security principles and practises on request and how we have designed our services to be secure from the outset and meet GDPR and other privacy and other good security and privacy practices.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
We adopt DevOps processes and use a fully automated deployment approach to minimise human error. Source code and deployment artefacts are held under version control. An Infrastructure-as-Code approach is used to deploy and manage all production assets, meaning that the state of the components is always well known and a previous state can be restored if necessary.

Releases are security and functionally tested using automated scripts, and our test suites are enhanced over time so that any issues identified can be prevented from reoccurring. Full release notes are provided to clients.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Our solutions utilise an enterprise serverless approach to systems architecture and development. What this means is that we develop our solutions using micro-services provided by cloud vendors, and inherent the security practices and approaches employed by those industry leading-cloud providers whilst being abstracted from the underlying infrastructure.

We use AWS, Microsoft Azure and Google Cloud to provide our services. Each of those providers has industry-leading practices and accreditations, manage vulnerability alerts on behalf of customers, perform third-party penetration and internal testing, deploy patches rapidly and monitor system performance and apply self-healing techniques where appropriate.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
As part of our standard services offering, we provide a fully managed service which includes proactive monitoring of services to ensure that they are operating within normal parameters and no unexpected or atypical behaviour is being observed, which is often a marker for a possible compromise.

When incidents do occur, all employees as well as contractors are aware of what constitutes an incident and are familiar with the reporting procedures. The specifics of the response time vary depending on the severity of the incident. Severe incidents and any potential data breaches are reported to clients within one business day.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
We follow an ITIL based incident management process designed to minimise the impact of any incident to the business operations of our clients.

We use automated monitoring to identify incidents proactively, ideally before any business operations are degraded as a result. As some of our services are provided via API to clients to embed into their own technologies, it is occasionally the case that these are observed before our own processes detect them. To cater for those situations an email and phone incident reporting service is available to clients as well as a monthly incident report.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

Fighting climate change

We encourage our employees to help with fighting climate change by offering schemes such as bike to work and paid leave to work with charities.

Covid-19 recovery

Covid-19 recovery

We offer our employees a flexible, hybrid working environment that allows them to manage work life following Covid-19. This gives them the option to work from home, the office or another location. In addition to this, we offer flexible working hours to support our employees manage childcare and other commitments while working from home.

We also provide our employees with health benefits to help with their work life balance and the impacts of events like Covid-19. This includes access to health and stress related helpline, complementary therapies, alternative therapies and a suite of wellbeing tools, guides and courses.

Tackling economic inequality

Tackling economic inequality

We create employment and training in the tech sector by recruiting graduates and providing training. We offer apprenticeships, placement roles and internships to those with only limited experience but want to work in the sector.

Equal opportunity

Equal opportunity

Rising Tide AI is committed to promoting equal opportunities in employment. Employees and job applicants receive equal treatment regardless of age, disability, gender reassignment, marital or civil partner status, pregnancy or maternity, race, colour, nationality, ethnic or national origin, religion or belief, sex or sexual orientation (Protected Characteristics).

Wellbeing

Wellbeing

We provide a flexible approach to working for our employees, allowing them to work remotely or face-to-face and to work hours that suit them. We believe this is an essential aspect of supporting our employee's health and wellbeing.

Furthermore, we actively encourage and support our employees to focus on their personal development in conjunction with their workload. We allow them to spend 10 to 20% of their working week on personal development.

As with flexible working we believe that personal development is key to mental health and well-being.

Pricing

Price
£500 to £10,000 a licence a month
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at iain.mckeith@rising-tide.ai. Tell them what format you need. It will help if you say what assistive technology you use.