Conversational AI Bot
Our Conversational AI service facilitates seamless interactions between humans and machines through advanced natural language processing. Key features include natural language understanding, contextual awareness, multi-channel support, personalization, integration capabilities, and analytics. Benefits include enhanced customer experience, increased efficiency, scalability, improved engagement, and cost savings.
Features
- Intentless Personalized responses
- Integration Capabilities
- Deep Insights feature
- Omni-channel deployment
- Smart workflows
- Automation of services
- Contextual Understanding
- Analytics and Insights
Benefits
- Reduced resolution time
- Higher Accuracy
- Reduced cost
- Smart responses
- Less dependency on human agent
- Automation
- Enhanced Customer Experience
- Scalability
- Improved Engagement
Pricing
£999 a licence a year
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
5 1 2 3 9 3 8 4 5 6 8 8 4 8 6
Contact
ENTERPRISE BOT PRIVATE LIMITED
Pranay Jain
Telephone: +41 77 981 54 53
Email: pranay@enterprisebot.ai
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
- No, we do not have any constraints that buyers should know about.
- System requirements
-
- Compatible Web Browser
- Regular Software Updates
- Security Standards
- Operating System Compatibility:
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- 12 hours for initial response
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
We offer both email and phone support with clearly defined Service Level Agreements (SLAs) for initial responses. When clients report software-related issues, we provide a support and SLA package tailored to their needs.
Additionally, we assign a project manager who will serve as the Single Point of Contact (SPOC) for the Enterprise Bot team. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We support end-to-end during business set-up and testing (ensure common understanding, address critical steps). Once we have the go-ahead, we conduct onsite and online workshops. We also provide Post go-live re-training support until the handover is done.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- At Enterprise Bot, we prioritize the client’s data ownership and control. When the contract concludes, we facilitate a smooth data export process through our user-friendly interface, allowing clients to tailor the export, ensuring security with robust measures, and complying with all relevant regulations. As the contract nears its end, we provide guidance u through the process, and our support team is available for assistance.
- End-of-contract process
- At the end of the contract term, users can expect a seamless transition facilitated by our team. Included in the contract price is access to our platform's core features and services, ensuring optimal functionality and support throughout the licensing period. Moreover, we offer the option to delete user content at the end of the contract, providing peace of mind regarding data privacy and compliance. This service ensures that user data is securely handled and managed in accordance with their preferences and regulatory requirements.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- There is no difference between the mobile and desktop service.
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- Description of service interface
-
We use the following service interface:
RESTful API (Representational State of Resource): A web service that uses HTTP methods to manipulate and retrieve data.
Webhooks: A callback function that is triggered by a specific event or action in the web application. - Accessibility standards
- WCAG 2.1 AA or EN 301 549
- Accessibility testing
- Yes, we support voice inputs and screen readers.
- API
- Yes
- What users can and can't do using the API
- Users can set up our service through the API by integrating it into their systems with authentication via API keys or tokens. They can configure settings like account and notification preferences. Changes to accounts or configurations can also be made through the API, including updating information, managing resources, or adjusting permissions. However, there may be limitations to certain administrative tasks or configurations for security and compliance reasons.
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Users can customize our service by adjusting various elements such as color, font, header and footer, and emojis. This customization can typically be done through user settings or preferences within the platform interface. Generally, any user with appropriate permissions, such as account administrators or users with editing privileges, can customize these elements according to their preferences.
Scaling
- Independence of resources
- We ensure that users aren't affected by the demand placed on our service by implementing autoscaling. Autoscaling automatically adjusts the resources allocated to our service based on current demand. This means that as demand increases, additional resources are automatically provisioned to maintain performance and reliability, ensuring a consistent user experience even during peak usage periods.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
We provide real-time dashboards and reporting that show the chatbot performance metrics including accuracy scores, session
durations, handling time, percentage of conversations handed over to a real person, intent statistics and sentiment scores. - Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- The user can export the data from the user interface platform. The bot and conversational data can also be downloaded using the same user interface platform. Once initiated, the platform will generate a downloadable file containing the selected data, which users can then save to their local device for further use or analysis.
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Other
- Other protection between networks
- Firewalls rules
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- Other
- Other protection within supplier network
- Firewall rules
Availability and resilience
- Guaranteed availability
- We guarantee a high level of availability for our services, with uptime commitments outlined in our Service Level Agreements (SLAs). If we fail to meet these guaranteed levels of availability, we provide service credits to users as specified in the SLAs.
- Approach to resilience
- Our service is designed with resilience in mind to ensure uninterrupted operations even in the face of disruptions. Our datacenter setup is resilient, employing redundant systems and failover mechanisms to mitigate risks. For more detailed information on our resilience approach, it is available upon request.
- Outage reporting
-
We report outages through following channels:
API: We offer an API for automated monitoring and alerting, allowing users to integrate outage notifications into their own systems, upon request.
Email alerts: Users can subscribe to email alerts to receive timely notifications about outages and service disruptions.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Access restrictions in management interfaces and support channels
- We restrict access in management interfaces and support channels through role-based access control (RBAC), ensuring that only authorized personnel have access to specific functionalities based on their job responsibilities. Additionally, we implement multi-factor authentication (MFA) and stringent password policies to further safeguard access.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- Between 1 month and 6 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
- SOC2 Type 2
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
-
SOC2 Type 2
GDPR
PCI-DSS
HIPPA - Information security policies and processes
-
We follow enterprise-grade security and follow the folliwng structure:
GDPR
SOC2 Type 2
PCI-DSS
HIPPA
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Our configuration and change management processes ensure service reliability and security by tracking components throughout their lifecycle and assessing changes for potential security impacts before implementation.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- Our vulnerability management process involves continuous monitoring for threats, prompt deployment of patches, and sourcing threat information from various reliable sources. This ensures proactive identification and mitigation of security risks to maintain the integrity of our services.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- We employ proactive protective monitoring processes to identify potential compromises swiftly. Our monitoring systems continuously analyze network traffic, system logs, and anomaly detection to flag any suspicious activity. When a potential compromise is detected, our response is immediate and follows a predefined escalation path. Our goal is to respond to incidents promptly, typically within agreed SLA, to minimize any potential impact and swiftly restore normal operations.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- We have pre-defined processes for common events to ensure efficient resolution. Users can report incidents via our phone and email. Following resolution, we provide concise incident reports detailing the cause, resolution steps, and preventive measures taken.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Equal opportunityEqual opportunity
We are an equal opportunity employer that promotes dynamic and collaborative work environment and encourages continuous learning and professional growth.
Pricing
- Price
- £999 a licence a year
- Discount for educational organisations
- No
- Free trial available
- No