FoundationDx Logo FAQs


FAQs

General Questions

  1. What is anomaly detection?

    Anomaly detection is the process of identifying unusual patterns or data points that do not conform to expected behavior. These anomalies can indicate critical incidents, such as errors, fraud, or significant deviations from the norm.

  2. What types of anomalies can your service detect?

    Our service can detect a wide range of anomalies, including point anomalies (single data points that are abnormal), contextual anomalies (anomalies based on the context, such as seasonality), and collective anomalies (when a collection of familiar data points is anomalous).

  3. How does your anomaly detection system work?

    Our system uses advanced algorithms, including machine learning, neural encoding and pattern detection, to analyze data streams and identify anomalies in near real-time. It can be configured to suit various data types and industries.

Technical Questions

  1. What data formats and sources can your service handle?

    Our system supports JSON and CSV file formats.

  2. How do you ensure the accuracy of your anomaly detection?

    We employ a combination of supervised and unsupervised machine learning models, continuous training on updated datasets, and validation processes to ensure high accuracy and low false positives/negatives.

  3. Can your service handle real-time anomaly detection?

    Yes, our service is designed to process data in real-time, providing instant alerts and insights as soon as an anomaly is detected.

  4. What are the scalability options for your anomaly detection solution?

    Our solution is highly scalable and can handle increasing volumes of data. It can provision additional cloud infrastructure that supports horizontal scaling, ensuring consistent performance as your data and use cases grow.

Implementation and Integration

  1. How long does it take to implement your anomaly detection system?

    Implementation time varies based on the complexity of the data beyond what we support in our standard format, but typically ranges from a few days to a few weeks.

  2. What is required to integrate your anomaly detection service with existing systems?

    Integration is usually straightforward and involves submitting a file manually or permitting us access to a remote file store.

  3. Can your service handle real-time anomaly detection?

    Yes, our service is designed to process data in real-time, providing instant alerts and insights as soon as an anomaly is detected.

  4. What are the scalability options for your anomaly detection solution?

    Our solution is highly scalable and can handle increasing volumes of data. It can provision additional cloud infrastructure that supports horizontal scaling, ensuring consistent performance as your data and use cases grow.

  5. What is the availability of services?

    We work to provide 24/7 availability for on-demand processsing minus small downtime for maintenance. If we fall materially short, we can provide a service credit. This credit will be the client partner's sole remedy for downtime and any associated inconvenience.

Security and Compliance

  1. How do you handle data privacy and security?

    We prioritize data privacy and security, employing encryption, secure data transfer protocols, and strict access controls. We also comply with HIPAA as required with additional cost to cover provisioning HIPPA compliant infrastructure services.

  2. What is the security on email attachments?

    We use TLS to encrypt emails and attachments in transit between browsers and our email servers. This is a standard level of security that protects against interception during transmission. However, once the data reaches its destination server, it may be decrypted and stored in plain text unless additional measures like E2EE are in place.

  3. What happens to my data after it is processed?

    Data retention policies can be customized based on your needs. Typically, data is either securely archived for future reference or deleted after processing, in line with your data governance requirements.

Pricing and Support

  1. What is the pricing model for your anomaly detection service?

    Our pricing model is flexible and based on factors such as data volume, the number of use cases monitored, and additional features like custom pre-processing of data. We offer tiered pricing plans to suit different business needs. Special programs are provided for 501(c)(3) organizations.

  2. Why is our pricing lower than expected?

    We use a staff of computers that require little salary yet live comfortable lives working 24/7. We also employ artifical intelligence to write code and proof read documentation.

  3. Can I try your service before committing to a subscription?

    Yes, we offer a free trial or demo version of our service so you can evaluate its performance and suitability for your needs.

  4. What kind of support do you provide?

    We offer an online contact form and 24/7 access to this list of evolving FAQs.

An error has occurred. This application may no longer respond until reloaded. Reload 🗙