Securium's Conversation Analysis for Internet Safety (Securium-Safeguard)
Securium-Safeguard facilitates the detection/prevention of crimes such as child sexual grooming and rape/serious sexual offences. It analyses texts on devices or in chatroom, or comments within live-streams. It combines the psychology of abuse and explainable-AI to identify perpetrators. It completes equivalent of 4 years of human reading in 6 hours.
Features
- Fast search and rapid triage, online or offline.
- Results ranked by threat level.
- Configurable action recommendations based on severity.
- Simplified result presentation for in-depth investigations.
- API for integration with leading law-enforcement tools.
- Integrates with forensic analysis systems such as i2 Analyst’s Notebook.
- Integrates with live monitoring systems.
- Deployable on devices, on-premises, or public infrastructure clouds.
- Customisable for CSEA, grooming, rape and serious sexual offences, etc.
- System flags usable as evidence due to explainable AI elements.
Benefits
- Quickly identify offenders and their conversations.
- Accelerate the investigation and evidence collection process.
- Speeds up detection and evidence collection whilst facilitating prevention.
- Increase investigative efficiency and reduce costs, reducing backlogs.
- Gain rapid insights into offender behaviours.
- View results in severity order for investigation.
- Allowing better offered management.
- Allow prevention and safeguarding through accelerated investigations and insight
- Reduces exposure of staff to harmful materials, improving wellbeing.
Pricing
£15,000.00 to £500,000.00 a licence a year
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
9 2 7 1 5 4 1 0 4 0 6 9 0 9 8
Contact
Securium Ltd
Securium's G-Cloud team
Telephone: -
Email: gcloud@securium.co.uk
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- Would vary depending on buyers existing capabilities.
- Cloud deployment model
-
- Public cloud
- Private cloud
- Service constraints
- Any buyer-specific hardware configurations would need to be known for private cloud deployment.
- System requirements
-
- Scalable computational provision in both compute and storage (infrastructure provision)
- Ease of connectivity to data sources
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Typically within 48 hours on working days, depending on the service needs within the question. Weekend support can be provided at extra cost.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Yes, at an extra cost
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- A common web chat system, suited to the customer, will be offered.
- Web chat accessibility testing
- N/A
- Onsite support
- Yes, at extra cost
- Support levels
- Securium’s normal support hours are 9.00am - 5.00pm Monday to Friday excluding Holidays. Support levels are flexible and the company can tailor a package to meet customer requirements.
- Support available to third parties
- No
Onboarding and offboarding
- Getting started
- On-boarding support is flexible and can be customised to meet the buyers need. This can include onsite integration work, user training and full user documentation.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- Users will extract data via the API provided.
- End-of-contract process
- Users must merely remove the software from any systems once any remaining data are retrieved.
Using the service
- Web browser interface
- No
- Application to install
- Yes
- Compatible operating systems
-
- Linux or Unix
- Windows
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
- API is set up for users to connect to the system and stream conversations for analysis. The API returns the results including the threat posed by authors.
- API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
- We can work with buyers to customise the mechanisms used for identification of suspect behaviours, to provide an additional user dashboard, and to analyse related behaviours within live streaming applications.
Scaling
- Independence of resources
- Provision can be made by defining tenanting arrangements.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Details of service metrics can be provided on request.
- Reporting types
-
- API access
- Real-time dashboards
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- Less than once a year
- Penetration testing approach
- In-house
- Protecting data at rest
- Other
- Other data at rest protection approach
- Data are encrypted.
- Data sanitisation process
- No
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Data exported via the API.
- Data export formats
- CSV
- Data import formats
- Other
- Other data import formats
- JSON
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- Other
- Other protection within supplier network
- There are no further service connections within the application.
Availability and resilience
- Guaranteed availability
- Dependent on the customer's needs and requirements and cost.
- Approach to resilience
- Details available on request
- Outage reporting
- Email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Username or password
- Other
- Other user authentication
- Details provided on request.
- Access restrictions in management interfaces and support channels
- User access is determined based on buyers’ need.
- Access restriction testing frequency
- Less than once a year
- Management access authentication
-
- Username or password
- Other
- Description of management access authentication
- Access should be governed by integrating systems.
Audit information for users
- Access to user activity audit information
- No audit information available
- Access to supplier activity audit information
- No audit information available
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- Securium has security in the core of its technical design, operation, deployment and customer engagement. More details can be provided on request.
- Information security policies and processes
- Details of Securium’s policies and processes can be provided on request.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Details on request.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Details on request.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Details on request.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Details on request.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
WellbeingWellbeing
Securium-Safeguard can reduce the load on investigators, analysts and moderators by automatically analysing text-based conversations for ‘harmful content’, thus reducing human exposure to such material to only that necessary, positively impacting on workplace wellbeing and helping to tackle stress related mental ill-health.
Pricing
- Price
- £15,000.00 to £500,000.00 a licence a year
- Discount for educational organisations
- No
- Free trial available
- No