Intelligent automation and AI solutions
Rising Tide AI provides solutions and services that help organisations take advantage of AI and automation. Solutions that are pre-built for fast configuration and deployment or as a starting point for a bespoke solution. These include email filing, automated processes, document reading and drafting, QA Targeting and data capture.
Features
- Analysis of business problems and identification of solution opportunities
- Proof of Concept (POC) approach
- Pre-built AI and automation solutions using leading AI tools
- Configuration of solutions for bespoke business problems
- Chatbot capabilities to enhance automation and customer engagement
- Intelligent orchestration, scheduling, workflow and management tools
- Simple and complex decision-making functionality
- Rapid deployment of managed service and scaling on demand
- Natural Language Processing for document analysis
- Large Language Models to interpret information and communications
Benefits
- Increase process and workforce efficiencies
- Enhance productivity by being able to do more with less
- Improve customer service by responding and completing requests quickly
- Manage customer experience by providing services more consistently
- Reduce operating expenditure
- Managed service solutions that quickly deliver return on investment
- Increase accuracy and improve compliance
- Create greater resilience to deal with spikes in demand
Pricing
£500 to £10,000 a licence a month
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
8 4 4 1 7 6 6 1 6 1 4 8 9 7 2
Contact
RISING TIDE AI LTD
Iain McKeith
Telephone: 07555765647
Email: iain.mckeith@rising-tide.ai
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Service constraints
- No. Our solutions are designed from the outset with error monitoring, and the ability to perform any necessary maintenance and updates in mind. Seamless updates with no downtime are a core component of our services.
- System requirements
- None
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Our standard SLAs and service support can be adjusted to meet individual organisation's needs up to a 24/7/365 support model. Initial response time varies depending on the specific tier of support purchased.
Our standard support offers an initial response time of 4 business hours for severity 1 issues - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Standard Support - Monday - Friday - 9.00am - 5.00pm
We can provide bespoke enhanced support options at an extra cost up to a complete support model that provides 24/7/365 support cover.
All of our customers are assigned a named business account manager and technical account manager.
Account managers perform periodic reviews of the service offering and its ongoing performance and act as first point of escalation should the need arise. - Support available to third parties
- No
Onboarding and offboarding
- Getting started
-
Workshops or conference calls are typically held to work through the solution and help the client team understand the rationale, approach, functionality and underlying technology of our solution.
Training is provided either on-site or via video conference depending on requirements.
We provide end user documentation for each specific solution as well as technical documentation so that our solutions can be integrated into other technologies.
Many of our services leverage cloud-based AI and Machine Learning technologies provided by organisations such as Amazon Web Services, Microsoft and Google who also provide training and documentation for their platforms. - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
-
In line with GDPR legislation and our role as a Data Processor, our services are designed to only store client data in a transient manner for the short period of time needed to provide the service.
Once a particular set of data is successfully processed it will be deleted from our systems and hence, we typically do not hold any client data that would require extraction at the end of a contract.
Any configuration of the systems and other associated inputs remain owned by the client at all times, and these can be extracted in accordance with the client data handling policies.
We also log information about the performance of the service. In line with good security practices, no personally identifiable information is stored in log files. Log files are available to clients to be extracted or removed at the end of the contract and can be audited at any time on request. - End-of-contract process
-
The specifics of the end-of-contract and any off-boarding or service migration requirements will be agreed at the start of the service.
Our standard service offering is a consumption-based service where customers pay a single recurring payment for the services provided. Should those services no longer be required, they can be removed after an agreed notice period with no further financial commitments.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Our browser-based interfaces are built either using responsive design or an alternate dedicated mobile experience where that is more appropriate. This means that there are typically no differences in functionality available through various devices, although information may need to be presented or rendered in a different way due to certain device limitations such as screen size.
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 A
- Description of service interface
- In order to monitor the ongoing performance of business processes and technology components within the managed service that we provide, we provide a service interface to provide near real-time information for most of our solutions.
- Accessibility standards
- WCAG 2.1 A
- Accessibility testing
- We test our software using a variety of screen readers and browsers. We are able to advise customers on the best combination of screen reader and browser technologies for each of our individual solutions.
- API
- Yes
- What users can and can't do using the API
-
Many of our services are designed to enhance existing business processes and applications with Artificial Intelligence and Machine Learning.
Those services are typically accessed via a secure API that we provide. Each customer will be provided with their own unique access credentials to securely access the API.
When the core service is being delivered via API, there are no limitations other than volumetric or other usage limitations that will form part of the agreement and contract. - API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- Other
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Our AI and automation solutions are pre-built and available to be used with little to no customisation. However, customers can also customise our solutions in order to meet their organisation's individual requirements.
Scaling
- Independence of resources
-
The solutions and services are built using leading AI platforms provided by Amazon Web Services, Microsoft Azure and Google Cloud.
By utilising industry-leading cloud providers, our solutions are designed from the outset to ensure that scalability is available on demand and peak loads from customers do not impact other customers.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Different metrics are produced depending on the solution being utilised or specific requirements. By default, a dashboard is available to view metrics such as number of transactions, utilisation and activity logs.
Pre-built exception reporting is included with the platform to inform the business of any errors encountered with the business data or systems. Within our standard service offering it is not usually necessary for the business to monitor these logs as that forms part of our overall service offering. - Reporting types
-
- API access
- Real-time dashboards
- Regular reports
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
-
Our solutions are designed with GDPR and other good security and privacy practices in mind. As such, any data used during the automation process is only transient and deleted upon completion. Our solutions do not store user data.
The only data we would typically hold is system logs and business rules. In line with good security practices, no personally identifiable information is stored in log files. Log files and business rules are available for client review or extraction using a variety of different formats as needed. - Data export formats
-
- CSV
- Other
- Data import formats
-
- CSV
- Other
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
Service level agreements and support terms will be defined with clients during the requirements gathering stage.
Our solutions are built on AI and Machine Learning capabilities provided by the industry-leading cloud providers AWS, Microsoft Azure and Google Cloud. Each has contractually guaranteed availability of at least 99.9% based on 24 x 7 availability (with some services higher). Cloud providers pay service credits if the platform fail to meet Service Level Agreements which we pass back to our clients.
As part of our standard support offer, we provided support from 9am to 5pm (UK time), Monday to Friday and manage the relationship with the cloud providers on behalf of our clients. - Approach to resilience
-
Our solutions are built on AI and Machine Learning capabilities provided by the industry-leading cloud providers AWS, Microsoft Azure and Google Cloud. Each of these providers publicises their own protection and resilience policies as a core tenet of their market-leading offerings.
Specifics vary by each individual provider, but each is designed with high availability, disaster recovery and backup as core capabilities. Redundancies comes at the service, data centre and regional levels.
Our services leverage the capabilities provided by these cloud vendors whilst considering GDPR and other security and privacy considerations to ensure that transient data used to provide services remains within regional boundaries (such as the UK) and that data sovereignty is well understood and implemented so that services don't 'fail over' to other regions or geographies. - Outage reporting
- Outages and other issues that might affect the services that we provide to clients are available via services outages reporting and dashboards. As part of our standard services package, we offer a fully managed service which provides ongoing monitoring of services so that issues with service performance can be addressed early and typically without the need for intervention by our clients.
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
-
We provide Role Based Access and Privileged Identity Management to our management and support channels.
Our clients need to provide a named set of users (which can vary over time) that are allowed to access the support and management services capabilities we provide. These named users will be provided with their own access credentials for the management and support services we offer. - Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users receive audit information on a regular basis
- How long user audit data is stored for
- Between 1 month and 6 months
- Access to supplier activity audit information
- Users receive audit information on a regular basis
- How long supplier audit data is stored for
- Between 1 month and 6 months
- How long system logs are stored for
- Between 1 month and 6 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
-
We adopt an organisation-wide and risk-first approach to information security.
What this means in practice is that our solutions are developed in a secure manner from the outset. Our practices include Principle of Least Privilege, data security in transit and at rest, not logging secure or personally identifiable information, regular security reviews, two-factor sign on and secure passwords for user accounts, penetration and load testing, continuous threat modelling and automated systems monitoring amongst others.
When incidents do occur, all employees as well as contractors are aware of what constitutes an incident and are familiar with the reporting procedures. - Information security policies and processes
-
We adopt an organisation-wide and risk-first approach to information security. Every employee as well as contractors are aware of what constitutes an incident and are familiar with the reporting procedures.
Every employee has the responsibility to report any security incidents or suspicion thereof to the Security Officer and ensure that the incident is sufficiently recorded. The Incident Management team is responsible to provide a rapid response and resume normal operation as soon as safely possible. The security incident management process is overseen by the Board who retain ultimate responsibility for security at all times.
Our security policies are built around the three principles of Confidentiality, Integrity and Availability meaning only individuals with appropriate access can access data or systems, data should remain intact and complete and users should be able to use the services provided.
We can provide more details about our security principles and practises on request and how we have designed our services to be secure from the outset and meet GDPR and other privacy and other good security and privacy practices.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
We adopt DevOps processes and use a fully automated deployment approach to minimise human error. Source code and deployment artefacts are held under version control. An Infrastructure-as-Code approach is used to deploy and manage all production assets, meaning that the state of the components is always well known and a previous state can be restored if necessary.
Releases are security and functionally tested using automated scripts, and our test suites are enhanced over time so that any issues identified can be prevented from reoccurring. Full release notes are provided to clients. - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
Our solutions utilise an enterprise serverless approach to systems architecture and development. What this means is that we develop our solutions using micro-services provided by cloud vendors, and inherent the security practices and approaches employed by those industry leading-cloud providers whilst being abstracted from the underlying infrastructure.
We use AWS, Microsoft Azure and Google Cloud to provide our services. Each of those providers has industry-leading practices and accreditations, manage vulnerability alerts on behalf of customers, perform third-party penetration and internal testing, deploy patches rapidly and monitor system performance and apply self-healing techniques where appropriate. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
As part of our standard services offering, we provide a fully managed service which includes proactive monitoring of services to ensure that they are operating within normal parameters and no unexpected or atypical behaviour is being observed, which is often a marker for a possible compromise.
When incidents do occur, all employees as well as contractors are aware of what constitutes an incident and are familiar with the reporting procedures. The specifics of the response time vary depending on the severity of the incident. Severe incidents and any potential data breaches are reported to clients within one business day. - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
We follow an ITIL based incident management process designed to minimise the impact of any incident to the business operations of our clients.
We use automated monitoring to identify incidents proactively, ideally before any business operations are degraded as a result. As some of our services are provided via API to clients to embed into their own technologies, it is occasionally the case that these are observed before our own processes detect them. To cater for those situations an email and phone incident reporting service is available to clients as well as a monthly incident report.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Fighting climate change
We encourage our employees to help with fighting climate change by offering schemes such as bike to work and paid leave to work with charities.Covid-19 recovery
Covid-19 recovery
We offer our employees a flexible, hybrid working environment that allows them to manage work life following Covid-19. This gives them the option to work from home, the office or another location. In addition to this, we offer flexible working hours to support our employees manage childcare and other commitments while working from home.
We also provide our employees with health benefits to help with their work life balance and the impacts of events like Covid-19. This includes access to health and stress related helpline, complementary therapies, alternative therapies and a suite of wellbeing tools, guides and courses.Tackling economic inequality
Tackling economic inequality
We create employment and training in the tech sector by recruiting graduates and providing training. We offer apprenticeships, placement roles and internships to those with only limited experience but want to work in the sector.Equal opportunity
Equal opportunity
Rising Tide AI is committed to promoting equal opportunities in employment. Employees and job applicants receive equal treatment regardless of age, disability, gender reassignment, marital or civil partner status, pregnancy or maternity, race, colour, nationality, ethnic or national origin, religion or belief, sex or sexual orientation (Protected Characteristics).Wellbeing
Wellbeing
We provide a flexible approach to working for our employees, allowing them to work remotely or face-to-face and to work hours that suit them. We believe this is an essential aspect of supporting our employee's health and wellbeing.
Furthermore, we actively encourage and support our employees to focus on their personal development in conjunction with their workload. We allow them to spend 10 to 20% of their working week on personal development.
As with flexible working we believe that personal development is key to mental health and well-being.
Pricing
- Price
- £500 to £10,000 a licence a month
- Discount for educational organisations
- No
- Free trial available
- No