Skip to main content

Help us improve the Digital Marketplace - send your feedback

EMOTECH LTD.

Generative Interactive AI Digital Avatar

Interactive AI Digital Avatar: Upgrade your user experiences with meaningful and realistic human interactions. Harness the power of large language models for intelligent conversations.
Text to avatar video: render avatar videos for your promotion videos

Features

  • Interactive digital avatar
  • Customer service
  • Education
  • HR onboarding

Benefits

  • Boost customer engagement
  • Low latency natural interaction
  • Reduce labour cost
  • 24/7 customer engagement
  • Boost brand image

Pricing

£42,000 a licence a year

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at s@emotech.co. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

7 2 7 9 5 7 5 5 4 9 8 4 4 6 0

Contact

EMOTECH LTD. Szu-Hung Lee
Telephone: 07563205153
Email: s@emotech.co

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints
Network condition
System requirements
  • GPU instances
  • Network bandwidth and low packet loss

User support

Email or online ticketing support
Email or online ticketing
Support response times
Working hours: 4 hours
Outside working hours: 24 hours
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
WCAG 2.1 AA or EN 301 549
Web chat accessibility testing
Colour blindness.
Onsite support
Yes, at extra cost
Support levels
Support level: 4 hour during working hours
Cost for different support levels: to be negotiated
We can provide a technical account manager or cloud support engineer with a cost
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We can organise onsite or online training.
Documentation will be provided
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
User can email us and request data
End-of-contract process
At the end of the contract, users won't be access to the digital avatar anymore. We will be extracting user data and consult with the users if they want to take the data back or destroy it.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Chrome
  • Safari
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
No significant difference
Service interface
No
User support accessibility
WCAG 2.1 AA or EN 301 549
API
Yes
What users can and can't do using the API
Users can set up Digital Avatar services
API documentation
Yes
API documentation formats
  • HTML
  • PDF
API sandbox or test environment
No
Customisation available
Yes
Description of customisation
We can customise the following with a fee:
- Look of the avatar
- voice of the avatar
- UI design

Scaling

Independence of resources
We are conducting auto-scaling for our deployments so when there's a peak of demand, the system will scale up to keep up with the demand.

Analytics

Service usage metrics
No

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Staff screening not performed
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
No
Datacentre security standards
Managed by a third party
Penetration testing frequency
Never
Protecting data at rest
Encryption of all physical media
Data sanitisation process
No
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
User can not export data but can request us to export for them.
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
99%
Approach to resilience
Available on request
Outage reporting
Email alerts

Identity and authentication

User authentication needed
Yes
User authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels
Slack admin tools
Access restriction testing frequency
At least once a year
Management access authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
Between 6 months and 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
Between 6 months and 12 months
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
No
Security governance certified
No
Security governance approach
We do case by case basis based on customer needs.
Information security policies and processes
BSIMM

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Scheduled automated dependency audit. Uses "Infrastructure as Code" to configure deployments.
Vulnerability management type
Undisclosed
Vulnerability management approach
Automated auditing of dependencies and assess impact based on usage. Also, via customer audits or reports of services. Patches can be deployed the same day as the issue is raised.
Protective monitoring type
Undisclosed
Protective monitoring approach
Monitoring API usage for anomalous traffic and reacting accordingly. Incidents can be responded to in 1-2 days
Incident management type
Undisclosed
Incident management approach
We provide service email for customers to raise incident reports.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

Wellbeing

Wellbeing

Digital avatars provide a more user-friendly interface for people to interact with technology.

Pricing

Price
£42,000 a licence a year
Discount for educational organisations
Yes
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at s@emotech.co. Tell them what format you need. It will help if you say what assistive technology you use.