KNIME Cloud Analytics Platform for Data Scientists
KNIME Cloud Analytics Platform is the open source software for creating data science. It makes understanding data and designing data science workflows and reusable components accessible to the data scientist. It does guided analytics, business intelligence, data mining, deep learning, data analysis, text mining and Big Data.
Features
- KNIME hub contains hundreds of ready to run workflows
- Complete cloud-based service (remote access, real-time-editing, fixed monthly cost)
- Data export and migration services
- Machine learning models (decision trees, logistic regression, deep learning)
- Connects to diverse databases, web services, cloud storage systems
- Wrappers for other softwares to be executed from within KNIME
- Integrates with open source projects (R, Python, Apache Spark)
- Offers ETL, data blending and data manipulation functionality
- Open source for customisation and extensibility
- Services provided from team of experienced data engineers
Benefits
- Analysing human resources, diversity and talent related data
- Making transportation systems faster and safer
- Reliably predict energy usage in cities
- Disease tagging especially now in the age of COVID-19
- Competitor Price Benchmarking
- Automatic Expense Reimbursements
- Predicting Stock Value Changes and Inventory Level Optimization
- Customer Sentiment Measurement
- Recommendation Engine for Retailers
Pricing
£601.22 a user a month
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
9 5 2 3 6 1 0 8 3 3 8 4 4 9 9
Contact
Synergistic Resources Ltd
Patrick Matambanadzo
Telephone: 01908867551
Email: info@synergisticresources.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- No known constraints
- System requirements
- KNIME complies with the latest EU and Public Contracts Regulations.
User support
- Email or online ticketing support
- Yes, at extra cost
- Support response times
- This depends on SLAs and the agreed requirements with our customers. Our standard response time is within 2 hours for 'critical' issues, within 5 hours for 'high priority' issues, and within 1 business day for all other issues. Response times are the same at weekends.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 A
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
P1: Critical - Response Time: 1hr
P2: Major - Response Time: 5hr
P3: Important - Response Time: 1 business day
P4: Minor - Response Time: Varies on request - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- KNIME makes available comprehensive documentation, video tutorials, webinars, training and troubleshooting materials as part of the User documentation. As a partner we provide additional tutorials and training for the user to hit the ground running.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- ODF
- End-of-contract data extraction
- Users can export their data using csv or excel format. A database export can also be generated.
- End-of-contract process
- No more than 4 months after expiration or termination of Customer’s use of an Online Service, KNIME will disable the account and delete Customer Data from the account .
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- There is The KNIME® Server REST API. A typical use case for a REST service would be to integrate the results from KNIME workflows into an existing, often complex IT infrastructure. It is a ‘self-documenting’ API, meaning that as you add workflows to KNIME Server, the description of how to use these workflows is automatically generated.
- Accessibility standards
- None or don’t know
- Description of accessibility
- https://www.knime.com/blog/the-knime-server-rest-api
- Accessibility testing
- We haven't done any testing but we expect the software supplier KNIME to have done so.
- API
- Yes
- What users can and can't do using the API
- https://www.knime.com/blog/the-knime-server-rest-api
- API documentation
- Yes
- API documentation formats
-
- HTML
- Other
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- As an open-source based solution, customisations are available and github access is provided. Customisation is through KNIME coding, and user interface. KNIME customisation requires appropriate access rights.
Scaling
- Independence of resources
- Systems are designed according to the client's requirements at the beginning of the service. We will work with the client to monitor performance, which will be reported at an agreed frequency. Future scope changes can be assessed and a performance analysis will determine the scaling required of the solutions.
Analytics
- Service usage metrics
- Yes
- Metrics types
- The client can setup any metrics they need for any application.
- Reporting types
- Reports on request
Resellers
- Supplier type
- Reseller providing extra support
- Organisation whose services are being resold
- KNIME (www.knime.com)
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- There is an export functionality within KNIME into csv. https://www.knime.com/knime-introductory-course/chapter4/section1/write-data-to-a-csv-file
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Other
- Other protection between networks
- We will implement the most appropriate and secure access from the buyers network e.g. VPN connectivity over a private circuit.
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- We guarantee 99.9% availability. In the extremely rare event that this is not the case, we will treat this as a Critical Issue and will work continuously on the problem until it is resolved. User refunds will be agreed prior to our engagement, and will reflect the significance of the issue and time exposure.
- Approach to resilience
- The service resilients is based on Azure and AWS hosting platforms.
- Outage reporting
- Automatic notification via the service status portal, Email, Alerts or Mobile Application.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- KNIME uses a managed list of authorised users or preference profiles as documented in https://www.knime.com/blog/simplify-operations-with-knime-server-management-services-for-knime-analytics-platform
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- Less than 1 month
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- Security is documented at https://www.knime.com/sites/default/files/KNIME-Software-Framework-and-Security.pdf
- Information security policies and processes
- Reporting comprises of automated notifications to our dedicated security team for any incident which suffers an outage, or require administrative access or an update. Reporting structure is from Staff Member through Team Lead to Product Owner.All incidents and breaches in security will be immediately reported to the client, via our dedicated account manager and resolution agreed. We ensure that policies are followed through regular external audits, as well as frequent internal reviews.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
The operational change control procedure considers the following actions:
• The identification and documentation of the planned change.
• An assessment process of possible change impact.
• Change testing in an approved non-production environment.
• Change communication plan.
• Change management approval process. - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- With regards to KNIME Server, there is no reason to be concerned with potential threats as there is an installer that disables the AJP protocol automatically, so the server is not affected by any vulnerability.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- We try to detect compromises and vulnerabilities as early as possible using intrusion detection tools. We then assess the severity together with the client and agree on an appropriate course of action.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- We follow strict incident management processes in accordance with the guidance from ISO20000 and ISO27001 standards. Incidents can be reported through our web portal or by telephone to our Service Desk operatives. Other incidents are triggered by alerts provided from the hosted platform and are treated in the same way.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
- Public Services Network (PSN)
Social Value
- Tackling economic inequality
-
Tackling economic inequality
Synergistic Resources Ltd will actively recruit locally and ensure that we match the demographics of our workforce to meet the needs, expectations and wishes of the contract. Our recruitment strategy will consider how we support the local employment economy to reflect the diversity of our external clients and internal staff profiles. As part of this contract, we will be supporting training opportunities through skills development and delivery of the apprenticeship commitment in Procurement Policy Note 14/15– Supporting Apprenticeships and Skills Through Public Procurement. - Equal opportunity
-
Equal opportunity
At Synergistic Resources Ltd we value diversity and accept each person for who they are in our provision of a non-discriminatory service. We will employ staff from different ethnic and cultural backgrounds. We have an Equality and Diversity Policy which we will use together with the Recruitment Policy in sourcing for suitable employees for this Contract. Equal opportunities will be considered in staff recruitment. Staff will be recruited regardless of their protected characteristics such as race, gender, religious beliefs, disability, or sexual orientation. We act sensitively towards the diverse needs of individuals and communities and take positive action where appropriate.
Pricing
- Price
- £601.22 a user a month
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- KNIME is available as a community version which is free but iis not cloud based. You can download a windows installer onto your desktop.
- Link to free trial
- https://www.knime.com/download-installer/2/64bit