Druid Ai - Build and deploy conversational Ai technology
DRUID Conversational AI is a technology that helps people communicate with systems in much the same way as they would converse with other individuals. Conversational technology can simulate human interactions, taking on tasks and activities ranging from responding to simple requests for information to handling more complex customer journeys.
Features
- Powerful but flexible NLP technology for conversations
- Connect systems to chatbots through low-code tooling
- Multi-channel notifications for any task or workflow
- Generate advanced reports by simply asking the chatbot
- Assists users in filling forms and decreases the operational costs
- Automatically route to human operator based on predefined rules
Benefits
- Save time & lower costs
- Enhance user experience
- Improve quality
- Boost customer / employeeengagement
Pricing
£20,000 an instance
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
8 0 4 8 4 4 1 8 7 6 1 6 1 5 7
Contact
JAAM AUTOMATION LTD
Justin Smith
Telephone: +447711772589
Email: info@jaamautomation.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- None
- System requirements
- Internet browser
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- 8AM - 5PM Monday - Friday
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- No
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- First, second, and third line support is provided on all application aspects e.g. bug and issue resolution. Custom solutions created on the platform can be supported as part of a separate managed services agreement.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Various levels of training can be undertaken. Online or in-person. Extensive user documentation is also provided. We also offer services to create the first chatbot with full handover and knowledge sharing to enable the customer to support and make enhancements post delivery.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Data can be stored both in the Cloud and On-Premise. These databases can be exported on-request when the contract ends.
- End-of-contract process
- When offboarding post contract, on request all data can be exported and provided to the customer. Once complete, the service instances will be taken offline and purged from all tenancies.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- None
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- The user interface is a web application hosted in the cloud or on-premise. The UI allows users to interact with intelligent chatbots created on the platform. It allows users to configure the chatbots via a web designer.
- Accessibility standards
- None or don’t know
- Description of accessibility
- See above.
- Accessibility testing
- Standard screen readers have been used within application testing and conform to basic assistive standards. Chatbots built on the platform allow for both voice and text input / output.
- API
- Yes
- What users can and can't do using the API
- Users have the ability to interact with chat sessions via the API to push and pull information that is relevant to the session. A full set of API definitions can be provided on request.
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Users can build customised conversational AI based on thier own requirements. This can be carried out by chatbot designers. The chatbots themselves can be intergrated and styled to embed seemlessly into the customer environment.
Scaling
- Independence of resources
- Each tenancy acts as a independant unit. Demand and usage will depend on deployment option. Cloud deployment will scale with demand, hybrid deployment will allow for data to be stored on-premise separating demand from shared resources, and on-premise will be governed by the customers infrastructure.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Coversational statistic.
Paths through conversations.
Time in each coversation stage.
Chatbot usage.
User information who use the chatbot. - Reporting types
-
- API access
- Real-time dashboards
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Druid Ai
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- On request or via the API.
- Data export formats
-
- CSV
- Other
- Other data export formats
- JSON
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- TODO
- Approach to resilience
- Available on request.
- Outage reporting
- Email alerts. Instance dashboard.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Role based permissions restrict access to all aspects of the platform.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- No
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- Available on request.
- Information security policies and processes
- Available on request.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Available on request.
- Vulnerability management type
- Undisclosed
- Vulnerability management approach
- Available on request.
- Protective monitoring type
- Undisclosed
- Protective monitoring approach
- Available on request.
- Incident management type
- Undisclosed
- Incident management approach
- Available on request.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Covid-19 recoveryCovid-19 recovery
The service promotes efficiency and automation within business, which in turn will provide economic growth as the country and economy recovers from the impacts of Covid-19
Pricing
- Price
- £20,000 an instance
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Full access to the platform for up to 30 days