Adversarial Artificial Intelligence Robustness Services For AI Benchmarking and Assurance
A managed service to test and evaluate; cohering Advai's AI Robustness tools for adversarial stress testing, evaluation and red-teaming of neural-network-based AI. Critical in creating assured and robust AI that is resilient to real-world conditions, our platforms align with MLOps, and are suitable for both technical and non-technical users.
Features
- Test and Evaluate AI systems for strengths and weaknesses
- Automated Stress Tests for Computer Vision, OCR AI and NLP
- Large Language Model evaluation and guardrails
- Automated Adversarial AI Red Team stress tests
- Flexible, cross-platform support to consistent design principles.
- Cloud-agnostic, capable of deployment on cloud and on premise.
- Integrated monitoring solutions to track performance, bugs and resource.
- Integrated and automated testing as part of a DevOps pipeline
- Scalable architecture, with easy configurability of CPU, GPU, etc resources.
- Modular, containerised design capable of bespoke configuration
Benefits
- Build AI systems to be secure, safe, and responsible.
- Configure AI to by robust, resilient and accurate
- Stress test AI systems to understand strengths and weaknesses
- Benchmark and select the best model for your use case
- Prioritise MLOps by identifying weaknesses at an earlier stage
- Understand vulnerabilities to Adversarial AI
- Identify, mitigate, and manage risks associated with AI deployment
- Safely implement Large Language Models
- Assure your AI system based on risk, regulation, and policy
Pricing
£30,000 a licence a month
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
9 2 0 2 4 6 4 9 2 4 4 9 8 1 9
Contact
ADVAI LTD
David Sully
Telephone: 07572990749
Email: contact@advai.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- Advai pushes releases in line with its scrum cycle every 2 weeks. These are minor release or bug fix releases. Support is limited to the containerised environments that are deployed. Any customisation not agreed with Advai is not supported.
- System requirements
-
- Chrome / Edge /Firefox
- OpenVPN or compatible VPN client or static IP routing
- Linux/Windows with WSL/AWS Hosting
- Enterprise Identity Provider (optional)
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Weekdays. 0900-1700; Upto 3 hours
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- The support requirement will be defined with the Customer during the Discovery phase, and costed according to the Service Delivery Document and Pricing Document.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Advai's capability sits at the cutting edge of AI technology and development. It is often the first time that users have encountered such a capability (there are no known market equivalents for stress testing and red teaming AI). We therefore advocate a collaborative approach to determine the task requirements (Advai Advance) and define the features of the required service and platform(s). We can conduct onsite training undertaken during the final stages of integration as part of a capability handover. We can also offer the ability to second personnel for side-by-side training with our specialists.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- Other
- Other documentation formats
- Confluence
- End-of-contract data extraction
- Our architecture enables the extraction of data held within it in a standard format, once complete the virtual storage will be collapsed.
- End-of-contract process
- On completion of the contract there will be additional work to remove users, API's, and any other mechanism put in place specific to that contract. This will be costed and resourced in a similar manner to the contract, and final price will be agreed with the Client.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
-
The interface is configured between two primary outcomes:
- Versus is configured for the technical user;
- Insight is configured for the business user. - Accessibility standards
- None or don’t know
- Description of accessibility
- None has currently been performed. This is in the roadmap for the service
- Accessibility testing
- None has currently been performed. This is in the roadmap for the service
- API
- Yes
- What users can and can't do using the API
- The service cannot be setup through the API. Service setup requires execution of Infrastructure as Code to be run before (tasks, facial verification, results and guardrails) can be accessed. Users can push task configurations or requests for task to be executed through the API. Currently this only support tasks for testing. Guardrails only supports LLM queries via a guardrails API. Should a customer require additional API access we would look to provide external endpoints for platform specific task that use currently protected APIs. Based on the customer requirement we would look to extend, create or provision access to APIs.
- API documentation
- Yes
- API documentation formats
- Open API (also known as Swagger)
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
Buyers can customise the service in the following ways:
- Determine which AI domain (e.g. CV, NLP, LLM);
- Provide any bespoke models or data;
- Configure the user interfaces based on preferences and required results.
- The platform can be configured and amended to suite Customer requirements.
Changes will be scoped and costed in accordance with the pricing document.
Scaling
- Independence of resources
- Any UK Gov contract or engagement will be supported by dedicated resource scaled to the requirements of the commitment.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Metrics types
CPU
Disk
HTTP request and response status
Memory - Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- Data can be downloaded from the application using unique expiring links.
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- PNG, JPEG
- JSON
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- Our service is designed with high availability, with redundancy inherent within the architectural design. We will work with the Client to understand the availability required from the system, and determine how that can be achieved.
- Approach to resilience
- Advai's architecture is designed for resilience, which can be enhanced if required. More detail is available on request.
- Outage reporting
- Outages will be reported via email alerts to the Client.
Identity and authentication
- User authentication needed
- Yes
- User authentication
- 2-factor authentication
- Access restrictions in management interfaces and support channels
- Segregated and defined user lists will be used to segregate user groups, including management and administrative personnel.
- Access restriction testing frequency
- At least once a year
- Management access authentication
- 2-factor authentication
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- Between 1 month and 6 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
-
We are working towards ISO/IEC 27001 Our internal audit will take place in May 2024. Our external audit and certification will take place between June and August 2024.
Security Governance is managed by company policies and controls. The standard procedure for all changes are: - Request for change; - Review and Risk analysis; - Approval for change; - Implement new resource access for defined period or until review; - Review resource access; - Update resources or permissions. All data is encrypted at rest, and appropriate audit controls put in place to track access and changes. - Information security policies and processes
- The company has the following policies: -IT Security Policies; -Acceptable use policies; -Data Loss Prevention; -Data Breach Policy and Reporting Template. All breaches are reported to IT Security Administrator and follow the steps outlined in each policy. At a high level these steps will have tiers of severity with corresponding SLAs for notifying affected parties. - Raise alert of breach; - Initiate Review and Escalation steps; - Communicate status to all required parties; - Initiate Check-in meetings for updates; - Resolve/Mitigate/Track issue; - Finish escalation process and notify of closure/tracking; - Review and learn from event. To promote that policies are followed staff are given initial and annual training.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Advai uses a feature management process that assesses the requirements of an update or addition before integrating it within our sprint cycle. Product Owners agree on the relative priorities. Any feature is code-checked and security scanned during testing. Any security-critical feature is fast-tracked through the process.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Our service continually monitors for threats. If a vulnerability is identified we will determine if the rectification belongs with the cloud supplier, Client hosting, or ourselves. In every-case we will determine the threat, risk and issues associated with the vulnerability and the services it impacts. Advai will close down non-critical services before engaging with the Client, actions for critical services will be pre-agreed with the Client. A rectification plan will be created and agreed with the Client, this will determine the speed of any patch deployment.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Our service continually monitors for compromise using Cloudflare. If a compromise is identified we will determine if the rectification belongs with AWS, Client hosting, or ourselves. In every-case we will determine the threat, risk and issues associated with the compromise and the services it has impacted. In the event of a compromise Advai will temporarily suspect all use accounts associated with the assessed attack vector and seek to re-verify all identification across the platform. We will work with the client to adapt to their own protective monitoring approach and integrate any alternative procedures into our own.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Advai's architecture is designed to respond to a range of incidents, primarily via it's scalable containerised approach. Our incident management approach is integrated into our feature management plan.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Tackling economic inequality
Fighting climate change
As an AI testing and evaluation company, we recognise the critical role that Artificial Intelligence plays in combating climate change. Identifying risks early in AI projects is paramount; it not only ensures the viability of environmental solutions but also significantly lowers project costs by preventing late-stage failures and expensive corrective measures. Through meticulous data analysis, we help optimise the performance of AI-driven climate initiatives, thereby reducing the costs associated with data management. This optimised data handling enhances the effectiveness of AI applications in monitoring environmental changes and managing renewable resources. Moreover, our expertise in developing robust AI systems increases their deployment success rates, crucial for reliable and sustainable environmental management tools. By ensuring these systems require minimal retraining, we also cut down on computational costs, aligning our technological advancements with sustainability goals. Thus, our role in testing and evaluating AI fortifies the link between advanced technology and effective climate action, ensuring that AI solutions are both impactful and economically feasible.Tackling economic inequality
Our position as a sustainably growing AI testing and evaluation company that recruits from across the UK allows us to bring a broad spectrum of perspectives to our company culture. Our focus on technical credibility during the interview process ensures that we onboard professionals who are not only technically proficient but also ready to contribute to our innovative work culture.
Pricing
- Price
- £30,000 a licence a month
- Discount for educational organisations
- No
- Free trial available
- No