AI Virtual Agents
We design and develop Virtual Agents. These AI enabled agents seamlessly integrate with the existing user experience layer and handle all incoming interactions. We’ve been able to classify and resolve complex customer queries by using AI and ML and connect to existing APIs to further enhance customer experience.
Features
- AI enabled chat
- Multiple device roll out
- Real time reporting
- Connects to Salesforce or other similar CRM
- Hybrid approach with OpenAI and Microsoft Composer
Benefits
- Reduction in human call centre staff
- Over 80% customer/users questions answered accurateley
- High containment rate of users (low drop out rate)
- 87% user satisfaction rate
- Available on multiple devices
- Easy integration and roll out within large organisations
- Both Voice and Text enabled virtual agents are available
Pricing
£100,000 a licence a year
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
5 2 3 2 3 9 2 6 2 1 5 5 7 1 1
Contact
Machine Two
Ranjit Gahir
Telephone: 02089933000
Email: ranjit.gahir@machinetwo.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- Existing websites, especially leveraging on data available on the FAQs sections of websites.
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- None
- System requirements
-
- Microsoft Windows server, 16 GB Ram, Disk space by usage
- Microsoft Azure Provides Network Security/Cloud features by default
User support
- Email or online ticketing support
- Yes, at extra cost
- Support response times
-
Within 24 hours - Monday to Friday.
Within 48 - Weekends and bank holidays - User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), 7 days a week
- Web chat support accessibility standard
- WCAG 2.1 A
- Web chat accessibility testing
- We design web chat engines
- Onsite support
- Yes, at extra cost
- Support levels
-
We provide onsite support between Monday to Friday 9am-5pm.
Our cost is tailor made to your needs. - Support available to third parties
- No
Onboarding and offboarding
- Getting started
-
We provide the following:
1. Technical user documentation to show architecture and set up. - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- It will be available in XLS format for each chat transcript generated.
- End-of-contract process
-
1. Data extraction in the for of XLS chat transcripts is included the end-of-contract process.
No other costs.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Its the responsive screen framework.
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 A
- Description of service interface
-
Chatbot window available on desktop and mobile devices.
Virtual voice agent available via Mobile phone or any other keypad device. - Accessibility standards
- WCAG 2.1 A
- Accessibility testing
- We've gone through contrast/font testing with users groups and used other text to speech technologies such as BrowseAloud.
- API
- No
- Customisation available
- Yes
- Description of customisation
-
Before its rolled out, the following can be customised:
1. Overall branding / Colours and Fonts
2. User journeys and responses can be tweaked to enhance user exepeience
3. Only a technical team (internal or our company) can customise the above.
Scaling
- Independence of resources
- We insure adequate load balancing and close monitoring of the service.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
1. Duration of Chats per session.
2. Success rate of chat via Feedback forms filled out by users of the service,
3. Chat Drop out rate - Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- XLS/CSV Format.
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- Private network or public sector network
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- We provide 99.99% uptime of our service. If the service is unavailable for any reason at all we provide a discounted monthly cost reduction that is agreed with both parties.
- Approach to resilience
- Available on request.
- Outage reporting
-
A public dashboard.
Email alerts.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
-
We have a roles based appication, where Users are only allowed access based on their 'ROLE'.
We also implement MFA for access. - Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
-
1. Access Control:Enforce strict access controls, least privilege principle, multi-factor authentication, and regular access reviews to limit unauthorised access to our cloud resources.
2. Data Encryption:Encrypt data at rest and in transit using encryption protocols to protect sensitive information from unauthorised access.
3. Security Monitoring:Implement real-time monitoring, logging, and auditing of our cloud environment to detect and respond to security incidents promptly.
4. Incident Response Plan:Developed and test an incident response plan to effectively respond to security breaches
5. Vendor Risk Management:Assess and monitor the security practices of our cloud service providers. - Information security policies and processes
-
Data Privacy Policy: We’ve Developed a data privacy policy that outlines how user data collected by the chatbot will be managed, stored, and protected in compliance with data protection regulations, such as GDPR or CCPA.
Authentication and Authorisation: Implement strong authentication mechanisms and role-based access control to ensure that only authorised users or systems can interact with the chatbot and access sensitive information.
Data Encryption: We encrypt sensitive data both in transit and at rest to prevent unauthorised access or interception of information exchanged between the chatbot and users.
Logging and Monitoring: We have robust logging mechanisms to record user interactions, system activities, and errors for monitoring, analysis, and audit trail purposes to detect and respond to security incidents.
Security Testing: We conduct regular security assessments, penetration testing, and vulnerability scans to identify and remediate security vulnerabilities in the chatbot application and infrastructure.
Secure Integration: We ensure secure integration of the chatbot with other systems, APIs, or databases by implementing secure coding practices, API authentication, and data validation mechanisms.
Incident Response Plan: We’ve develop an incident response plan specific to chatbot security incidents, outlining procedures for identifying, containing, investigating, and recovering from security breaches or data leaks.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
1. Version Control System: We use GIT to maintain the chatbot's codebase and track changes over time.
2. Change Control Process: We track new features through JIRA
3. Configuration Management: We track new configs through JIRA
4. Deployment Strategy: We have a 4 stage deployment environment strategy: Development, Pre Production, UAT and Production. This ensures continuous integration/continuous deployment (CI/CD) pipelines and automation. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
We have an incident reporting system help desk where potential threats are logged, tracked and dealt with.
We monitor our applications 24/7 and get alerted as soon as they occur.
We endeavour to deploy patches within 24 hours of logging. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- We monitor our applications 24/7 and get alerted as soon as they occur. We endeavour to deploy patches within 24 hours of logging.
- Incident management type
- Supplier-defined controls
- Incident management approach
- We have an incident reporting system help desk where potential threats are logged, tracked and dealt with. We monitor our applications 24/7 and get alerted as soon as they occur. We endeavour to deploy patches within 24 hours of logging.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
WellbeingWellbeing
We introduce virtual agents as a way of relieving the stress endured by call centre staff.
Pricing
- Price
- £100,000 a licence a year
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- Fullly functional application for available for 1 month
- Link to free trial
- N/A