Skip to main content

Help us improve the Digital Marketplace - send your feedback

ENTERPRISE BOT PRIVATE LIMITED

Conversational AI Bot

Our Conversational AI service facilitates seamless interactions between humans and machines through advanced natural language processing. Key features include natural language understanding, contextual awareness, multi-channel support, personalization, integration capabilities, and analytics. Benefits include enhanced customer experience, increased efficiency, scalability, improved engagement, and cost savings.

Features

  • Intentless Personalized responses
  • Integration Capabilities
  • Deep Insights feature
  • Omni-channel deployment
  • Smart workflows
  • Automation of services
  • Contextual Understanding
  • Analytics and Insights

Benefits

  • Reduced resolution time
  • Higher Accuracy
  • Reduced cost
  • Smart responses
  • Less dependency on human agent
  • Automation
  • Enhanced Customer Experience
  • Scalability
  • Improved Engagement

Pricing

£999 a licence a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at pranay@enterprisebot.ai. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

5 1 2 3 9 3 8 4 5 6 8 8 4 8 6

Contact

ENTERPRISE BOT PRIVATE LIMITED Pranay Jain
Telephone: +41 77 981 54 53
Email: pranay@enterprisebot.ai

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints
No, we do not have any constraints that buyers should know about.
System requirements
  • Compatible Web Browser
  • Regular Software Updates
  • Security Standards
  • Operating System Compatibility:

User support

Email or online ticketing support
Email or online ticketing
Support response times
12 hours for initial response
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
We offer both email and phone support with clearly defined Service Level Agreements (SLAs) for initial responses. When clients report software-related issues, we provide a support and SLA package tailored to their needs.

Additionally, we assign a project manager who will serve as the Single Point of Contact (SPOC) for the Enterprise Bot team.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We support end-to-end during business set-up and testing (ensure common understanding, address critical steps). Once we have the go-ahead, we conduct onsite and online workshops. We also provide Post go-live re-training support until the handover is done.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
At Enterprise Bot, we prioritize the client’s data ownership and control. When the contract concludes, we facilitate a smooth data export process through our user-friendly interface, allowing clients to tailor the export, ensuring security with robust measures, and complying with all relevant regulations. As the contract nears its end, we provide guidance u through the process, and our support team is available for assistance.
End-of-contract process
At the end of the contract term, users can expect a seamless transition facilitated by our team. Included in the contract price is access to our platform's core features and services, ensuring optimal functionality and support throughout the licensing period. Moreover, we offer the option to delete user content at the end of the contract, providing peace of mind regarding data privacy and compliance. This service ensures that user data is securely handled and managed in accordance with their preferences and regulatory requirements.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
There is no difference between the mobile and desktop service.
Service interface
Yes
User support accessibility
WCAG 2.1 AA or EN 301 549
Description of service interface
We use the following service interface:

RESTful API (Representational State of Resource): A web service that uses HTTP methods to manipulate and retrieve data.

Webhooks: A callback function that is triggered by a specific event or action in the web application.
Accessibility standards
WCAG 2.1 AA or EN 301 549
Accessibility testing
Yes, we support voice inputs and screen readers.
API
Yes
What users can and can't do using the API
Users can set up our service through the API by integrating it into their systems with authentication via API keys or tokens. They can configure settings like account and notification preferences. Changes to accounts or configurations can also be made through the API, including updating information, managing resources, or adjusting permissions. However, there may be limitations to certain administrative tasks or configurations for security and compliance reasons.
API documentation
Yes
API documentation formats
  • Open API (also known as Swagger)
  • PDF
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Users can customize our service by adjusting various elements such as color, font, header and footer, and emojis. This customization can typically be done through user settings or preferences within the platform interface. Generally, any user with appropriate permissions, such as account administrators or users with editing privileges, can customize these elements according to their preferences.

Scaling

Independence of resources
We ensure that users aren't affected by the demand placed on our service by implementing autoscaling. Autoscaling automatically adjusts the resources allocated to our service based on current demand. This means that as demand increases, additional resources are automatically provisioned to maintain performance and reliability, ensuring a consistent user experience even during peak usage periods.

Analytics

Service usage metrics
Yes
Metrics types
We provide real-time dashboards and reporting that show the chatbot performance metrics including accuracy scores, session
durations, handling time, percentage of conversations handed over to a real person, intent statistics and sentiment scores.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
The user can export the data from the user interface platform. The bot and conversational data can also be downloaded using the same user interface platform. Once initiated, the platform will generate a downloadable file containing the selected data, which users can then save to their local device for further use or analysis.
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Other
Other protection between networks
Firewalls rules
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Other
Other protection within supplier network
Firewall rules

Availability and resilience

Guaranteed availability
We guarantee a high level of availability for our services, with uptime commitments outlined in our Service Level Agreements (SLAs). If we fail to meet these guaranteed levels of availability, we provide service credits to users as specified in the SLAs.
Approach to resilience
Our service is designed with resilience in mind to ensure uninterrupted operations even in the face of disruptions. Our datacenter setup is resilient, employing redundant systems and failover mechanisms to mitigate risks. For more detailed information on our resilience approach, it is available upon request.
Outage reporting
We report outages through following channels:

API: We offer an API for automated monitoring and alerting, allowing users to integrate outage notifications into their own systems, upon request.

Email alerts: Users can subscribe to email alerts to receive timely notifications about outages and service disruptions.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels
We restrict access in management interfaces and support channels through role-based access control (RBAC), ensuring that only authorized personnel have access to specific functionalities based on their job responsibilities. Additionally, we implement multi-factor authentication (MFA) and stringent password policies to further safeguard access.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
Yes
Any other security certifications
SOC2 Type 2

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
Other
Other security governance standards
SOC2 Type 2
GDPR
PCI-DSS
HIPPA
Information security policies and processes
We follow enterprise-grade security and follow the folliwng structure:

GDPR
SOC2 Type 2
PCI-DSS
HIPPA

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Our configuration and change management processes ensure service reliability and security by tracking components throughout their lifecycle and assessing changes for potential security impacts before implementation.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Our vulnerability management process involves continuous monitoring for threats, prompt deployment of patches, and sourcing threat information from various reliable sources. This ensures proactive identification and mitigation of security risks to maintain the integrity of our services.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
We employ proactive protective monitoring processes to identify potential compromises swiftly. Our monitoring systems continuously analyze network traffic, system logs, and anomaly detection to flag any suspicious activity. When a potential compromise is detected, our response is immediate and follows a predefined escalation path. Our goal is to respond to incidents promptly, typically within agreed SLA, to minimize any potential impact and swiftly restore normal operations.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
We have pre-defined processes for common events to ensure efficient resolution. Users can report incidents via our phone and email. Following resolution, we provide concise incident reports detailing the cause, resolution steps, and preventive measures taken.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

Equal opportunity

Equal opportunity

We are an equal opportunity employer that promotes dynamic and collaborative work environment and encourages continuous learning and professional growth.

Pricing

Price
£999 a licence a year
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at pranay@enterprisebot.ai. Tell them what format you need. It will help if you say what assistive technology you use.