No-Code user-centred GenAIOps Platform
No-code platform for the creation of generative AI apps and agents. LLM agnostic, configurable Retrieval Augmented Generation (RAG) capability, GenAI evaluation and observability OOTB, industry-leading guardrails deliverable via plain text and a range of ready-made integrations. All build in-line with GenAIOps Principles.
Features
- Agent-based development
 - LLM agnostic
 - Evaluation & Observability OOTB
 - Guardrails
 - Integrations to multiple channels
 - Multi-agent integrations
 - API connectivity
 - User-centered Gen AI development
 - GenAIOps aligned
 - Instant chatbot feature
 
Benefits
- Quickly build working Gen AI agents
 - Ground agents in your data
 - Select the best LLM for use case
 - Monitor agent use and responses
 - Use AI to evaluate and de-risk
 - Instant POC development
 - Low-cost, high-speed agent development
 
Pricing
£500 to £500,000 a licence a month
- Free trial available
 
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
9 5 9 5 0 8 8 4 9 9 8 4 1 3 1
Contact
    GREAT WAVE AI LIMITED
    
    Samuel Hazeldine
    
    
    Telephone: 07787243033
    
    
    Email: contact@greatwave.ai
    
  
Service scope
- Software add-on or extension
 - No
 - Cloud deployment model
 - 
      
- Public cloud
 - Private cloud
 - Hybrid cloud
 
 - Service constraints
 - Nil
 - System requirements
 - 
      
- Microsoft edge
 - Google chrome
 - Apple safari
 - Firefox
 
 
User support
- Email or online ticketing support
 - Email or online ticketing
 - Support response times
 - Within 1 working day
 - User can manage status and priority of support tickets
 - No
 - Phone support
 - Yes
 - Phone support availability
 - 9 to 5 (UK time), Monday to Friday
 - Web chat support
 - Web chat
 - Web chat support availability
 - 24 hours, 7 days a week
 - Web chat support accessibility standard
 - WCAG 2.1 A
 - Web chat accessibility testing
 - Nil
 - Onsite support
 - Yes, at extra cost
 - Support levels
 - Can provide full 24/7/365 support with industry-leading SLAs subject to contract.
 - Support available to third parties
 - Yes
 
Onboarding and offboarding
- Getting started
 - A combination of initial workshops, a gen AI chat bot service, manuals and telephone support as required.
 - Service documentation
 - Yes
 - Documentation formats
 - HTML
 - End-of-contract data extraction
 - Everything can be downloaded to CSV
 - End-of-contract process
 - All transition and end-of-service costs are additional and should be agreed at the start of the contract.
 
Using the service
- Web browser interface
 - Yes
 - Supported browsers
 - 
      
- Internet Explorer 11
 - Microsoft Edge
 - Firefox
 - Chrome
 - Safari
 - Opera
 
 - Application to install
 - No
 - Designed for use on mobile devices
 - Yes
 - Differences between the mobile and desktop service
 - No major differences
 - Service interface
 - Yes
 - User support accessibility
 - WCAG 2.1 A
 - Description of service interface
 - Evaluation screen on the platform allows for constant monitoring of agent performance
 - Accessibility standards
 - WCAG 2.1 A
 - Accessibility testing
 - Nil
 - API
 - Yes
 - What users can and can't do using the API
 - All functionality within the platform is available via APIs as well as no-code front-end
 - API documentation
 - Yes
 - API documentation formats
 - HTML
 - API sandbox or test environment
 - Yes
 - Customisation available
 - Yes
 - Description of customisation
 - The whole platform is designed to be customised via the creation and management of use-case specific generative AI agents.
 
Scaling
- Independence of resources
 - Auto scaling
 
Analytics
- Service usage metrics
 - Yes
 - Metrics types
 - Query volumes, response volumes and quality
 - Reporting types
 - 
      
- API access
 - Real-time dashboards
 
 
Resellers
- Supplier type
 - Not a reseller
 
Staff security
- Staff security clearance
 - Staff screening not performed
 - Government security clearance
 - Up to Developed Vetting (DV)
 
Asset protection
- Knowledge of data storage and processing locations
 - Yes
 - Data storage and processing locations
 - United Kingdom
 - User control over data storage and processing locations
 - Yes
 - Datacentre security standards
 - Complies with a recognised standard (for example CSA CCM version 3.0)
 - Penetration testing frequency
 - At least every 6 months
 - Penetration testing approach
 - In-house
 - Protecting data at rest
 - 
      
- Physical access control, complying with CSA CCM v3.0
 - Physical access control, complying with SSAE-16 / ISAE 3402
 - Encryption of all physical media
 - Scale, obfuscating techniques, or data storage sharding
 
 - Data sanitisation process
 - Yes
 - Data sanitisation type
 - 
      
- Explicit overwriting of storage before reallocation
 - Deleted data can’t be directly accessed
 
 - Equipment disposal approach
 - Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
 
Data importing and exporting
- Data export approach
 - CSV
 - Data export formats
 - CSV
 - Data import formats
 - CSV
 
Data-in-transit protection
- Data protection between buyer and supplier networks
 - 
      
- Private network or public sector network
 - TLS (version 1.2 or above)
 
 - Data protection within supplier network
 - TLS (version 1.2 or above)
 
Availability and resilience
- Guaranteed availability
 - 
      99.9% during working hours
99% outside working hours
subject to contract - Approach to resilience
 - Utilize Microsoft PAAS technology which has built-in resilience and application architecture in-line with Azure well-architected framework. e.g. multi-region
 - Outage reporting
 - Email alerts
 
Identity and authentication
- User authentication needed
 - Yes
 - User authentication
 - 
      
- Public key authentication (including by TLS client certificate)
 - Username or password
 
 - Access restrictions in management interfaces and support channels
 - N/A
 - Access restriction testing frequency
 - At least every 6 months
 - Management access authentication
 - 
      
- Public key authentication (including by TLS client certificate)
 - Username or password
 
 
Audit information for users
- Access to user activity audit information
 - Users contact the support team to get audit information
 - How long user audit data is stored for
 - At least 12 months
 - Access to supplier activity audit information
 - Users contact the support team to get audit information
 - How long supplier audit data is stored for
 - At least 12 months
 - How long system logs are stored for
 - At least 12 months
 
Standards and certifications
- ISO/IEC 27001 certification
 - No
 - ISO 28000:2007 certification
 - No
 - CSA STAR certification
 - No
 - PCI certification
 - No
 - Cyber essentials
 - Yes
 - Cyber essentials plus
 - No
 - Other security certifications
 - No
 
Security governance
- Named board-level person responsible for service security
 - Yes
 - Security governance certified
 - Yes
 - Security governance standards
 - Other
 - Other security governance standards
 - Cyber Essentials, ISO 42001
 - Information security policies and processes
 - ISO 27001 and Cyber esentials
 
Operational security
- Configuration and change management standard
 - Supplier-defined controls
 - Configuration and change management approach
 - In line with ITIL 4 best practices
 - Vulnerability management type
 - Supplier-defined controls
 - Vulnerability management approach
 - In-line with ITIL 4 best practice
 - Protective monitoring type
 - Supplier-defined controls
 - Protective monitoring approach
 - Utilize Microsoft security technology such as firewalls and Azzure security centre
 - Incident management type
 - Supplier-defined controls
 - Incident management approach
 - In-line with ITIL 4 best practice
 
Secure development
- Approach to secure software development best practice
 - Conforms to a recognised standard, but self-assessed
 
Public sector networks
- Connection to public sector networks
 - No
 
Social Value
- Social Value
 - 
      
Social Value
- Tackling economic inequality
 - Equal opportunity
 
Tackling economic inequality
40% of our workforce come from minority groups within economically disadvantaged backgrounds. They are recruited via the government's bootcamp schemes which we remain a keen supporter of.Equal opportunity
40% of our workforce come from minority groups within economically disadvantaged backgrounds. They are recruited via the government's bootcamp schemes which we remain a keen supporter of. 
Pricing
- Price
 - £500 to £500,000 a licence a month
 - Discount for educational organisations
 - No
 - Free trial available
 - Yes
 - Description of free trial
 - All features included but time and volume limited