Omnichannel Contact Centre Software
MaxContact’s powerful contact centre platform offers scalability and flexibility to fit your organisation’s needs. Whether it’s outbound dialling or omnichannel, our solution brings together customer interactions into one seamless platform. Improve customer experience, increase efficiency, and drive continuous improvement with full visibility of your team’s performance – wherever they’re working.
Features
- Omnichannel Solutions (Voice, SMS, WhatsApp, Social Media, Web Chat)
- Inbound Contact Centre Solutions
- Advanced Outbound Dialling
- Performance Measurement & Reporting
- Speech Analytics
- Team development and Performance Insights
- AI Chatbot Functionality
- Quality Assurance Insights
- Data Management, KPI's and Dashboards
- Workforce Management
Benefits
- Consolidate customer interactions across multiple channels into one platform.
- Build streamlined IVR systems with PCI-compliant payment functionality.
- Optimise outbound with predictive dialling and Answer Machine Detection.
- Gain valuable insights with real-time and historic data.
- Harness speech analytics to increase compliance and customer experience.
- Give customers a personalised self-serve option with AI Chatbots.
- Enhance your team's skills with real-time performance data.
- Effective workforce management to optimise resourced and reduce staff churn.
- Empower your team to manage multiple inbound channels simultaneously.
- Boost customer and employee experience, all while reducing costs.
Pricing
£40.00 to £85.00 a licence a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
5 1 2 9 7 7 1 7 8 0 7 8 7 2 5
Contact
MaxContact
Richard Coward
Telephone: 07919566942
Email: Richard.Coward@MaxContact.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- Service available 24/7 365 days a year, maintenance is always performed outside of working hours
- System requirements
-
- Internet Connected Device
- Modern Browser
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Depends on severity of ticket but between 15 minutes and 24 hours
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web chat accessibility testing
- Testing for visually impaired and differently-abled users
- Onsite support
- Onsite support
- Support levels
- We have two levels of customer support 8am-8pm or 24/7, standard 8am-8pm support is included within license costs. 24/7 support is an additional cost charged at £10 per user per month. Both support packages include all software upgrades and onsite account management as well as monthly online training courses.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We ask all customers to complete a customer onboarding document, this provides us with the customer requirements. We will then configure the system to your exact requirements and then provide onsite or remote training on how the system has been configured and how it can be amended in the future. Training is split into multiple sessions which are tailored to specific job roles and these sessions can be customised to your exact requirements. User documentation along with online videos and recordings of previous webinars are available on our knowledge base.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- At the end of the contract we will provide our customers with a secure Microsoft Azure Blob Storage link. This will include a copy of the database including all information along with all call recordings. We then ask for a dedicated user email address, the IP address in which you will be accessing the data and will then send a secure link which will expire after a configurable period of time. Once all the data has been downloaded we will permanently delete the data along with any backups in line with our Data Deletion Policy.
- End-of-contract process
- At the end of the contract any ongoing subscriptions will stop being charged and we will provide you with the secure link as described in the previous question to download your data. We dont charge anything for this method of customer off-boarding. If a different method of off boarding was required this maybe chargeable but only if we incurred significant labour or 3rd party costs.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Mobile devices are mainly used for managers rather than advisors, due to the lack of space on a mobile device it is difficult for advisors to be able to handle multiple concurrent interactions on a mobile device.
- Service interface
- No
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- API
- Yes
- What users can and can't do using the API
- There are various data management services that allow data to be imported, updated and extracted from the platform. Telephony controls can also be controlled via API to take the functionality from our system and embed it into another platform e.g. Back office system. The only limitations are that API's are locked down by IP Address, Token and username and password. These limitations are put in place for security reasons.
- API documentation
- Yes
- API documentation formats
-
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- All elements of the system can be customised to your exact business requirements. These include the interaction channels, configuration, dashboards, wallboards along with alerts. All customisation is available within the product and requires no technical knowledge, operational staff who have been on our training courses or read/watched our online guides will be able to perform the customisation.
Scaling
- Independence of resources
- All customers have their own dedicated environment with no shared resources so it is impossible for any of our customers to have an impact on another customer. All of our customer environments are built to the required specification to handle the expected load plus an overhead for an unexpected usage
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Service Availability
Number of tickets created and resolved
Average resolution of tickets
SLA Adherence
Who created the tickets
Method ticket was received
Bugs Raised
Feature Requests Raised
Top 10 ticket types
Ticket Categorisation
Incidents Raised and Resolved
Plus any other metrics which you may require - Reporting types
-
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Data can be exported within the product should the user have the permission to do this, or can be exported using our standard or custom reporting functionality. Both of these can be completed by non technical staff who have been on our training course or read/watched the user documentation. The other two options are more technical these require either accessing OData or using a replication server to export the information.
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- Excel
- SQL Database
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- We contractually guarantee 99.9% platform availability, the actual uptime across the base over the last 12 months was 99.997%. Service credits are provided if the availability drops below 99.9% and is a sliding scale with the lower the availability the higher the service credit percentage.
- Approach to resilience
- All UK customers are hosted in Microsoft Azure UK South (London) or UK West ( Cardiff), the system is configured to have local redundant storage which is in a different fault zone with high availability to a different fault zone in a different region so that if all data centres in one location failed the system would failover to the other region.
- Outage reporting
- These are included within the monthly service reports, customer would receive email alerts if there was a problem. Internally we have dashboards which highlight any issues across infrastructure or applications.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Public key authentication (including by TLS client certificate)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- Management interfaces are locked down by permission group, users can be added to a permission group which means they inherit the permissions from that group. Permissions can be limited to whether they can access a page or not and what functionality on the page can be seen. Permissions are very granular which can be configured to your exact requirements. Access to support channels is limited to Operational and Technical contact who need to be added at point of onboarding and can only be amended by an Operational Contact
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- Public key authentication (including by TLS client certificate)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- BSI
- ISO/IEC 27001 accreditation date
- 15/11/2021
- What the ISO/IEC 27001 doesn’t cover
- The only SoA clauses which arent covered are A11.1.6 (Delivery & Loading) & A14.2.7 Outsourced Development
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- Yes
- Who accredited the PCI DSS certification
- NCC Group
- PCI DSS accreditation date
- 27/04/2024
- What the PCI DSS doesn’t cover
- The AoC only covers us for MOTO/Call Centre as we partner with a level 1 compliant company
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- As part of our ISO27001 accredited Information Security Management System this is made up of over 100 policies and procedures. These include but not limited to Information Security, Clear Desk ,Access Control, Acceptable Usage, BCP & DR, Change Management, Mobile Device, Patch Management. Top Level Management are involved in the ISMS and involved in the quarterly reviews, along with Weekly and Monthly meetings along with the internal quarterly audit and external annual audits. The reporting structure follows our company hierarchy with the relevant escalation procedures. We ensure that policies are followed by ensuring that all employees understand the important of Information Security and why it is critical to the success of our business. This starts from their first day of employment as Information Security is included throughout the induction training. All employees have to complete at least 6 monthly refresher training courses, with staff who have access to customer data or manage infrastructure having to complete refresher courses every 3 months. Following training courses all staff have to complete an examination on the content of the refresher course along with additional questions relating to their role or department. Any staff who dont achieve the pass have to repeat the training.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- The change management process is split into three different types of change:- Standard, Normal and Emergency. The type of change is determined used our Risk & Impact Matrix which highlights the level of impact and risk. All change requests are document and go through different change processes dependent on the type, some can be authorised by Managers others must go through one of the bi weekly CAB meetings for approval. Configuration changes are split by type into Internal and Customer Initiated. This allows for all changes to be tracked and reviewed and forms part of our KPI Reporting.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Vulnerability scanning is included within Azures Security Centre, this allows for VM's, Databases and networks to be continually monitored. In the event that a threat is identified this is displayed in Wallboards within the DevOps team and creates a critical ticket in our help desk software. Patches are deployed anything from same day to 7 days depending on the severity level. The severity level is determined using a risk rating process which will then determine the priority.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Protective monitoring is in place in multiple places, the first place is part of Microsoft Azure offering is Azure Security Centre this provides tools for monitoring of infrastructure, VM's and then internal monitoring software is used to monitor the applications which are then installed on the VM's. Any alerts from Azure or internal systems automatically are flagged on to DevOps wallboards and Dashboards with a ticket created within internal helpdesk system as Critical. This emails all managers and Directors so that visibility is provided to a range of employees, with continual alerts until the alert has been verfied and mitigated.
- Incident management type
- Supplier-defined controls
- Incident management approach
- There are various processes for incidents depending on the type of incident e.g Compliance, security, availability. All processes are documented within our Incident Management Procedure with the relevant process flows so all staff are aware who they need to inform, how the incident should be categorised, the severity of the incident. Depending on the incident type these will be logged via internal ticket management system with the appropriate tag e.g. security, this will then alert the relevant managers or directors. Templates for different types of incidents are available within the policy to ensure the relevant information is captured.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
- Public Services Network (PSN)
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
We have a carbon reduction plan in place to become Carbon neutral by 2050 with a initial plan for 2030. Microsoft Azure has also done analysis showing running services in Azure is 98% cheaper than running solutions on customer premisesCovid-19 recovery
By allowing for system to be accessed from any internet device allowed people to be able to work from any location to allow for people to be able to get back into work. We also supported over 2000 advisors to provide Track and Trace services during CovidTackling economic inequality
We support start up organisations for SME sized companies by providing them with access to systems which other global organisations don't provide due to the number of licenses being acquired.Equal opportunity
By ensuring the all suppliers with in our supply chain guarantee they agree to manage the risks and ensure that modern slavery is not present in any of their supply chainsWellbeing
Agent wellbeing feature has been added to the agent interface with reminders on exercise, hydration with reporting on how teams not individuals are interacting with the feature
Pricing
- Price
- £40.00 to £85.00 a licence a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Full system access for a period of 30 days typically, however this can be extended up to a maximum of 90 days. Training and configuration is also included free of charge. The only system functionality which is excluded is bespoke integration and PCI compliant payments