Omni-Reach
Omni-Reach is a platform for customer engagement via two-way sms and/or webchat. It includes a trainable chatbot that can do the heavy lifting, handle and answer FAQ's before handing to the correct team or agent based on query type
Features
- SaaS web based secure access
- Two-way SMS
- Webchat
- Chatbot
- Machine learning
- Real-time reporting
- Agent reporting
- Natural Language Processing
Benefits
- Single Agent Interface
- Easy to set up, programmable chatbot
- SMS and webchat in one agent interface
- Low cost of entry
- Free set up and support
- Scaleable
- Customers can self-serve
- Identifies vulnerability
- API integration
- Full reporting suite
Pricing
£50.00 a licence
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
9 4 1 3 7 7 5 0 6 3 0 4 9 5 4
Contact
Saascoms
Darren Swailes or Paul Nield
Telephone: 01785 240680
Email: enquiries@saascoms.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- None
- System requirements
- Web browser access
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Within 2 working hours
Mon - Fri 8am to 9pm
Sat 9am - 1pm - User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Every account is allocated a technical support manager.
All customers have free telephony support.
Free training.
Free support for set up and chatbot programming. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Full train is given typically in an online/virtual environment
Full set up support/assistance is given to set up the chatbot programming/workflows - Service documentation
- Yes
- Documentation formats
-
- ODF
- End-of-contract data extraction
-
Any saved data can be exported.
On closing the account, all data is merged and deleted beyond recoverable state - End-of-contract process
-
Omni-Reach is provided on an agent license and licenses can be added mid term applicable only for the remainder of the 12 month minimum period.
See pricing for license and message costs
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
-
API for information or broadcast upload
API for report download - API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- API sandbox or test environment
- Yes
- Customisation available
- No
Scaling
- Independence of resources
- Service resides in MS Azure with dynamic server allocation
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Agent performance
Agent logins
Service up time
Message usage
Conversation resolution rates
+ More - Reporting types
-
- API access
- Real-time dashboards
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- Less than once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Encryption of all physical media
- Data sanitisation process
- No
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Typically users export data to sftp. A Power BI format is available for those users wishing to create their own bespoke reporting
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
Our SLA's are mirrored to that of the MS Azure service where we reside.
We do not offer refunds - Approach to resilience
-
UK MS Azure data service
Co-located London/Cardiff
Sub 30 min restore time - Outage reporting
- Public dashboard and email/telephone alert from our service team
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Users have various auth levels to determine what service they have access to and which tasks they are able to perform
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- QMS/ASCB
- ISO/IEC 27001 accreditation date
- 17/01/2017
- What the ISO/IEC 27001 doesn’t cover
- All of our serviced are covered
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- We have strict security governance detailed within our ISO27001 ISM manual. Extracts are available upon request
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
We follow a defined change process and software develop process in line with policy set out in our ISO27001.
Policies available for inspection upon request are;
Application security
Information Security
Secure development
Secure development Principles - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
We have alerts from MS Azure with a variety of service monitors in line with the Azure security measures deployed.
We PEN test the site at regular intervals so that a recognised external testing organisation can independently assess the strength or our architecture.
We monitor various sources for alert/risk identification to ensure we patch where required. Dependant on necessity, patches can be deployed sub 1 hour - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Our service detects invalid or multiple log on attempts and phishing detection is in place. Potential risks are record and addressed with immediate effect. RCA's are provided to clients to demonstrate process of indication, remediation, prevention and assessed risk
- Incident management type
- Supplier-defined controls
- Incident management approach
-
Incidents should be reported in the first instance by telephone which instigates an investigation where you will be asked to detail your comments in response form format. we do not deploy a single investigation methodology as this should be dynamic based on the nature of the incident.
A formal RCA process is followed and reported accordingly
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Equal opportunityEqual opportunity
Allows communication by any electronic means and 24 hours service
Pricing
- Price
- £50.00 a licence
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
-
Full access and set up trial is free
SMS usage is chargeable
1 month limitation