Kaiasm OntoKai - Knowledge Representation and Ontology Management software
OntoKai is a new kind of software for envisioning, managing, translating and merging detailed knowledge representations such as taxonomies, ontologies and data models. It supports work in data sharing, data standards, data quality and improving data skills; key problem areas targeted by the National Audit Office to improve government data.
Features
- Structuring unstructured data to support next generation AI modelling tools
- Visualisation of data assets, flows and relationships, internally and externally
- Ontologies to make data and data structures accessible to generalists
- Illustration of organisational demand (satisfied, frustrated and unmet) for data
- Data condition assessment and tracking of change
- Audit of data ownership, governance and absent accountabilities
- Identification and resolution of data gaps and overlaps across agencies
- EU AI quality and transparency compliance for high-risk systems
- Data pre-processing, normalization and transformation
- Data selection by complex criteria from multiple data sources
Benefits
- Easier data integration between numerous, heterogeneous sources
- Reduced information rework from more accessible data and files
- Reduced friction when exchanging information between contracting parties
- Increased efficiency, risk-reduction from joining datasets and applying AI.
- Insight into knowledge held in separate silos, networks and agencies
- Increased understanding between mutually dependent but unconnected systems
- A common visual language for non-technical and technical data users
- Improving the underlying infrastructure for AI with affordable humans
- Identification of valid, novel, useful and explainable patterns in data
- Value driven data adaptation, extension, quality assurance and quality controls
Pricing
£9.99 to £332.99 a user a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
9 0 4 1 8 5 0 8 3 2 3 0 0 3 1
Contact
KAIASM LTD
Steve Johnston
Telephone: 0330 223 1164
Email: info@kaiasm.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- None
- System requirements
-
- Scalable Vector Graphic capable web browser
- Some JavaScript libraries that run in the client browser.
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
UK operational hours (Monday to Friday, 9-5, excluding bank holidays), unless the SoW between the client and supplier specifically includes provisions for out of hours support.
SLA response time within 2 hrs to within 16 hrs depending on trouble. - User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Yes, at an extra cost
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web chat accessibility testing
- OntoKai can inherit 3rd party solutions such as Teams/Slack. Built-in capabilities are therefore not natively included though could be provided at additional cost.
- Onsite support
- Yes, at extra cost
- Support levels
-
Support levels and pricing agreed on a per contract basis.
Typical SLA outline provided in the accompanying Service Description Document.
Ranges from no support required through to extensive consultancy support. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
We provide
- onsite training
- offsite training
- user documentation
- in-application help - Service documentation
- Yes
- Documentation formats
-
- HTML
- Other
- Other documentation formats
-
- Google Docs
- Microsoft Word
- End-of-contract data extraction
- A user may download their data, as a whole or in part, at any point, in a variety of web standards formats including JSON or CSV (or OWL, if required).
- End-of-contract process
- Client may opt to continue the service at a different service level, or cancel the service.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Mobile version version of the desktop service cut down as appropriate to the smaller screen size.
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- Description of service interface
- Web bowser client
- Accessibility standards
- WCAG 2.1 AA or EN 301 549
- Accessibility testing
-
UAT with Voiceover (sight impairments)
UAT without mouse (mobility impariments) - API
- Yes
- What users can and can't do using the API
-
Our API and API-like functionality comprises a Python library that provides the database access function, and a JSON API which provides all the functionality needed by the front end.
The API is largely used internally, but can be made available to clients. - API documentation
- Yes
- API documentation formats
- Other
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
The service is designed to be highly customisable.
For example,
- Custom views can be defined and bookmarked by any user.
- Custom entity and relationship attributes can be defined for particular use cases.
- Data validation rules can be defined for particular use cases.
- Test, warn and task rules can be defined for particular use cases.
Customisations which affect other users are reserved for users with at least editor level permissions.
Scaling
- Independence of resources
-
Service is deployed either within AWS (in which case standard AWS SLAs apply), or within a clients own cloud tenancy.
Service can be instantiated on local hardware when high security requirements are required.
Analytics
- Service usage metrics
- Yes
- Metrics types
- The web application is instrumented for Google Analytics (this can be removed on request for secure environments)
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Other
- Other data at rest protection approach
-
Physical access controls as per Amazon Inc. AWS data centre controls.
Depending on client need, an extra level of security can be applied by holding all data at rest on AWS cloud instances as encrypted, at no additional cost. (All data in flight is encrypted by default.) - Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Via a download option within the application.
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- JSON
- OWL (if required)
- Data import formats
-
- CSV
- ODF
- Other
- Other data import formats
-
- JSON
- OWL
- XML
- Excel
- Log files
- Google Sheets
- SKOS
- RDF
- Any other data format by request (additional cost)
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
If the service is hosted by Kaiasm, then uptime of covered services is guaranteed to a certain percentage of time within UK office hours, which is 9am-5.30pm Mon-Fri excluding bank holidays (the services will normally also be available outside these hours). The level of guaranteed uptime ranges from 95% to 99%, depending on the priority level of the service.
Uptime is calculated to the nearest minute, based on the number of minutes in the given month within the scope of the SLA. If uptime for any item drops below the relevant threshold, a penalty will be applied in the form of a credit for the client. The following month’s fee payable for the named service will be reduced on a sliding scale, or additional time will be added to the end of the contract, at the client's discretion.
Penalties range from 1% to 5% of the covered service per hour of downtime, depending on the priority of service. Uptime penalties in any month are capped at 100% of the total monthly fee of the covered service. Uptime measurements exclude periods of routine maintenance. These must be agreed between the supplier and client in advance. - Approach to resilience
- Information on resilience is available on request.
- Outage reporting
- Email and chat alerts.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Access restrictions in management interfaces and support channels
-
As per user authentication plus, optionally:
- IP Whitelist/Firewall
- VPN
- Role based permission control - Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- Cyber Essentials Plus
- Information security policies and processes
-
Information security policies are available on request and include:
- Firewalls;
- Secure configuration;
- User access control;
- Malware protections;
- Patch management.
General infosec policies include:
- Use and misuse;
- Working Remotely;
- Bring Your Own Device (BYOD) & Working from Home;
- Information classification;
- Backups;
- Access control, including administrator access policy;
- Password policy;
- Cryptographic controls;
- Social media & Personal Devices;
- Whitelisted Apps.
Policy compliance ensured via Cyber Essentials Plus certification, as well as internal controls (managed on an ongoing basis, including weekly patch scanning, and an annual compliance audit).
As we are a small company, reporting structure would be directly from IT or ops engineer to a member of senior managment.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Status, location and configuration of service components (both hardware and software) are tracked throughout their lifetime.
Changes to the service are assessed for potential security impact. Then managed and tracked through to completion. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Cybersec risk/threat assessment performed annually as per Cyber Essentials Plus.
Patching timescales as per Cyber Essentials Plus:
- If evidence suggests a vulnerability is being actively exploited in the wild, mitigation to be put in place immediately.
- ‘Critical’ patches deployed within hours
- ‘Important’ patches deployed within 2 weeks of a patch becoming available
- ‘Other’ patches deployed within 8 weeks of a patch becoming available
Information on potential threats sourced from
- Endpoint Central patch scanning
- NCSC Early Warning service
- Mailing lists (various) - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
The system supports extensive event auditing.
Further details on protective monitoring approach available on request. - Incident management type
- Supplier-defined controls
- Incident management approach
-
Pre-planned incident management processes in place.
Detailed incident management approach available on request.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Sustainable Development: We are committed to reducing our environmental impact by utilising renewable energy where available, optimising data centre energy usage, and aiming for carbon neutrality in our operations. Supply Chain Responsibility: We select our suppliers considering their environmentally responsible practices and that our procurement choices support our sustainable development goals.Covid-19 recovery
Workplace and Working practice changes: Since the end of the pandemic, we have supported the mental and physical health of our employees by extending our flexible working practices to facilitate more working from home, including investments in equipment that makes it easy to work from home or the office. We have also invested in filter systems in the office to reduce the transmission of viruses and therefore reduce the workplace risks of contracting COVID-19 and other air-borne diseases.Tackling economic inequality
Ethical Labour Practices: We pay fair wages and provide safe working conditions in our company, supporting job security and worker rights. We have always supported very flexible working hours, making particular effort to support employees with caring commitments, either through school-friendly hours or remote working. Economic Impact: We attempt to stimulate the local economy by hiring within local communities, engaging local suppliers, and contributing to local economic activities, such as Chambers of Commerce.Equal opportunity
Diversity and Inclusion: We implement hiring and training practices that enable increasing diversity within our workforce. We foster an inclusive workplace culture. Innovation in Social Impact: Our software and training is empowering to the skills development of our employees and our client users.Wellbeing
Data Ethics and Privacy: We maintain high standards of data protection and user privacy to ensure that personal information is secure and handled with care, enhancing the trust and wellbeing of our employees and service users. Wellbeing Initiatives: We promote mental and physical health initiatives within your company, like flexible working conditions, communal breaks, company lunches, company walks and social events. Programmes that contribute to the overall wellbeing of our employees.
Pricing
- Price
- £9.99 to £332.99 a user a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
-
OntoKai can be made available to organisations wanting to evaluate the service.
A trial instance of OntoKai includes anonymised test data and the ability to view the data only. It removes write, edit, merge and download capabilities.
Trials run for 7 to 30 days, depending on requirements.