Synergistic Resources Ltd

KNIME Cloud Analytics Platform for Data Scientists

KNIME Cloud Analytics Platform is the open source software for creating data science. It makes understanding data and designing data science workflows and reusable components accessible to the data scientist. It does guided analytics, business intelligence, data mining, deep learning, data analysis, text mining and Big Data.

Features

  • KNIME hub contains hundreds of ready to run workflows
  • Complete cloud-based service (remote access, real-time-editing, fixed monthly cost)
  • Data export and migration services
  • Machine learning models (decision trees, logistic regression, deep learning)
  • Connects to diverse databases, web services, cloud storage systems
  • Wrappers for other softwares to be executed from within KNIME
  • Integrates with open source projects (R, Python, Apache Spark)
  • Offers ETL, data blending and data manipulation functionality
  • Open source for customisation and extensibility
  • Services provided from team of experienced data engineers

Benefits

  • Analysing human resources, diversity and talent related data
  • Making transportation systems faster and safer
  • Reliably predict energy usage in cities
  • Disease tagging especially now in the age of COVID-19
  • Competitor Price Benchmarking
  • Automatic Expense Reimbursements
  • Predicting Stock Value Changes and Inventory Level Optimization
  • Customer Sentiment Measurement
  • Recommendation Engine for Retailers

Pricing

£601.22 a user a month

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at info@synergisticresources.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 13

Service ID

9 5 2 3 6 1 0 8 3 3 8 4 4 9 9

Contact

Synergistic Resources Ltd Patrick Matambanadzo
Telephone: 01908867551
Email: info@synergisticresources.co.uk

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints
No known constraints
System requirements
KNIME complies with the latest EU and Public Contracts Regulations.

User support

Email or online ticketing support
Yes, at extra cost
Support response times
This depends on SLAs and the agreed requirements with our customers. Our standard response time is within 2 hours for 'critical' issues, within 5 hours for 'high priority' issues, and within 1 business day for all other issues. Response times are the same at weekends.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 A
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
P1: Critical - Response Time: 1hr
P2: Major - Response Time: 5hr
P3: Important - Response Time: 1 business day
P4: Minor - Response Time: Varies on request
Support available to third parties
Yes

Onboarding and offboarding

Getting started
KNIME makes available comprehensive documentation, video tutorials, webinars, training and troubleshooting materials as part of the User documentation. As a partner we provide additional tutorials and training for the user to hit the ground running.
Service documentation
Yes
Documentation formats
  • HTML
  • ODF
End-of-contract data extraction
Users can export their data using csv or excel format. A database export can also be generated.
End-of-contract process
No more than 4 months after expiration or termination of Customer’s use of an Online Service, KNIME will disable the account and delete Customer Data from the account .

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
No
Designed for use on mobile devices
No
Service interface
Yes
User support accessibility
None or don’t know
Description of service interface
There is The KNIME® Server REST API. A typical use case for a REST service would be to integrate the results from KNIME workflows into an existing, often complex IT infrastructure. It is a ‘self-documenting’ API, meaning that as you add workflows to KNIME Server, the description of how to use these workflows is automatically generated.
Accessibility standards
None or don’t know
Description of accessibility
https://www.knime.com/blog/the-knime-server-rest-api
Accessibility testing
We haven't done any testing but we expect the software supplier KNIME to have done so.
API
Yes
What users can and can't do using the API
https://www.knime.com/blog/the-knime-server-rest-api
API documentation
Yes
API documentation formats
  • HTML
  • PDF
  • Other
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
As an open-source based solution, customisations are available and github access is provided. Customisation is through KNIME coding, and user interface. KNIME customisation requires appropriate access rights.

Scaling

Independence of resources
Systems are designed according to the client's requirements at the beginning of the service. We will work with the client to monitor performance, which will be reported at an agreed frequency. Future scope changes can be assessed and a performance analysis will determine the scaling required of the solutions.

Analytics

Service usage metrics
Yes
Metrics types
The client can setup any metrics they need for any application.
Reporting types
Reports on request

Resellers

Supplier type
Reseller providing extra support
Organisation whose services are being resold
KNIME (www.knime.com)

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
There is an export functionality within KNIME into csv. https://www.knime.com/knime-introductory-course/chapter4/section1/write-data-to-a-csv-file
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Other
Other protection between networks
We will implement the most appropriate and secure access from the buyers network e.g. VPN connectivity over a private circuit.
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
We guarantee 99.9% availability. In the extremely rare event that this is not the case, we will treat this as a Critical Issue and will work continuously on the problem until it is resolved. User refunds will be agreed prior to our engagement, and will reflect the significance of the issue and time exposure.
Approach to resilience
The service resilients is based on Azure and AWS hosting platforms.
Outage reporting
Automatic notification via the service status portal, Email, Alerts or Mobile Application.

Identity and authentication

User authentication needed
Yes
User authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
KNIME uses a managed list of authorised users or preference profiles as documented in https://www.knime.com/blog/simplify-operations-with-knime-server-management-services-for-knime-analytics-platform
Access restriction testing frequency
At least once a year
Management access authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
Less than 1 month

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
Security is documented at https://www.knime.com/sites/default/files/KNIME-Software-Framework-and-Security.pdf
Information security policies and processes
Reporting comprises of automated notifications to our dedicated security team for any incident which suffers an outage, or require administrative access or an update. Reporting structure is from Staff Member through Team Lead to Product Owner.All incidents and breaches in security will be immediately reported to the client, via our dedicated account manager and resolution agreed. We ensure that policies are followed through regular external audits, as well as frequent internal reviews.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
The operational change control procedure considers the following actions:
• The identification and documentation of the planned change.
• An assessment process of possible change impact.
• Change testing in an approved non-production environment.
• Change communication plan.
• Change management approval process.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
With regards to KNIME Server, there is no reason to be concerned with potential threats as there is an installer that disables the AJP protocol automatically, so the server is not affected by any vulnerability.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
We try to detect compromises and vulnerabilities as early as possible using intrusion detection tools. We then assess the severity together with the client and agree on an appropriate course of action.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
We follow strict incident management processes in accordance with the guidance from ISO20000 and ISO27001 standards. Incidents can be reported through our web portal or by telephone to our Service Desk operatives. Other incidents are triggered by alerts provided from the hosted platform and are treated in the same way.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
Yes
Connected networks
Public Services Network (PSN)

Social Value

Tackling economic inequality

Tackling economic inequality

Synergistic Resources Ltd will actively recruit locally and ensure that we match the demographics of our workforce to meet the needs, expectations and wishes of the contract. Our recruitment strategy will consider how we support the local employment economy to reflect the diversity of our external clients and internal staff profiles. As part of this contract, we will be supporting training opportunities through skills development and delivery of the apprenticeship commitment in Procurement Policy Note 14/15– Supporting Apprenticeships and Skills Through Public Procurement.
Equal opportunity

Equal opportunity

At Synergistic Resources Ltd we value diversity and accept each person for who they are in our provision of a non-discriminatory service. We will employ staff from different ethnic and cultural backgrounds. We have an Equality and Diversity Policy which we will use together with the Recruitment Policy in sourcing for suitable employees for this Contract. Equal opportunities will be considered in staff recruitment. Staff will be recruited regardless of their protected characteristics such as race, gender, religious beliefs, disability, or sexual orientation. We act sensitively towards the diverse needs of individuals and communities and take positive action where appropriate.

Pricing

Price
£601.22 a user a month
Discount for educational organisations
No
Free trial available
Yes
Description of free trial
KNIME is available as a community version which is free but iis not cloud based. You can download a windows installer onto your desktop.
Link to free trial
https://www.knime.com/download-installer/2/64bit

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at info@synergisticresources.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.