Skip to main content

Help us improve the Digital Marketplace - send your feedback

JAAM AUTOMATION LTD

Druid Ai - Build and deploy conversational Ai technology

DRUID Conversational AI is a technology that helps people communicate with systems in much the same way as they would converse with other individuals. Conversational technology can simulate human interactions, taking on tasks and activities ranging from responding to simple requests for information to handling more complex customer journeys.

Features

  • Powerful but flexible NLP technology for conversations
  • Connect systems to chatbots through low-code tooling
  • Multi-channel notifications for any task or workflow
  • Generate advanced reports by simply asking the chatbot
  • Assists users in filling forms and decreases the operational costs
  • Automatically route to human operator based on predefined rules

Benefits

  • Save time & lower costs
  • Enhance user experience
  • Improve quality
  • Boost customer / employeeengagement

Pricing

£20,000 an instance

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at info@jaamautomation.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

8 0 4 8 4 4 1 8 7 6 1 6 1 5 7

Contact

JAAM AUTOMATION LTD Justin Smith
Telephone: +447711772589
Email: info@jaamautomation.com

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints
None
System requirements
Internet browser

User support

Email or online ticketing support
Email or online ticketing
Support response times
8AM - 5PM Monday - Friday
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
No
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
First, second, and third line support is provided on all application aspects e.g. bug and issue resolution. Custom solutions created on the platform can be supported as part of a separate managed services agreement.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Various levels of training can be undertaken. Online or in-person. Extensive user documentation is also provided. We also offer services to create the first chatbot with full handover and knowledge sharing to enable the customer to support and make enhancements post delivery.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Data can be stored both in the Cloud and On-Premise. These databases can be exported on-request when the contract ends.
End-of-contract process
When offboarding post contract, on request all data can be exported and provided to the customer. Once complete, the service instances will be taken offline and purged from all tenancies.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
None
Service interface
Yes
User support accessibility
None or don’t know
Description of service interface
The user interface is a web application hosted in the cloud or on-premise. The UI allows users to interact with intelligent chatbots created on the platform. It allows users to configure the chatbots via a web designer.
Accessibility standards
None or don’t know
Description of accessibility
See above.
Accessibility testing
Standard screen readers have been used within application testing and conform to basic assistive standards. Chatbots built on the platform allow for both voice and text input / output.
API
Yes
What users can and can't do using the API
Users have the ability to interact with chat sessions via the API to push and pull information that is relevant to the session. A full set of API definitions can be provided on request.
API documentation
Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
  • PDF
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Users can build customised conversational AI based on thier own requirements. This can be carried out by chatbot designers. The chatbots themselves can be intergrated and styled to embed seemlessly into the customer environment.

Scaling

Independence of resources
Each tenancy acts as a independant unit. Demand and usage will depend on deployment option. Cloud deployment will scale with demand, hybrid deployment will allow for data to be stored on-premise separating demand from shared resources, and on-premise will be governed by the customers infrastructure.

Analytics

Service usage metrics
Yes
Metrics types
Coversational statistic.
Paths through conversations.
Time in each coversation stage.
Chatbot usage.
User information who use the chatbot.
Reporting types
  • API access
  • Real-time dashboards

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Druid Ai

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
On request or via the API.
Data export formats
  • CSV
  • Other
Other data export formats
JSON
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
TODO
Approach to resilience
Available on request.
Outage reporting
Email alerts. Instance dashboard.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
Role based permissions restrict access to all aspects of the platform.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
No
Security governance certified
Yes
Security governance standards
Other
Other security governance standards
Available on request.
Information security policies and processes
Available on request.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Available on request.
Vulnerability management type
Undisclosed
Vulnerability management approach
Available on request.
Protective monitoring type
Undisclosed
Protective monitoring approach
Available on request.
Incident management type
Undisclosed
Incident management approach
Available on request.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

Covid-19 recovery

Covid-19 recovery

The service promotes efficiency and automation within business, which in turn will provide economic growth as the country and economy recovers from the impacts of Covid-19

Pricing

Price
£20,000 an instance
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Full access to the platform for up to 30 days

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at info@jaamautomation.com. Tell them what format you need. It will help if you say what assistive technology you use.