Vocala Ltd.

Voice activated digital products and services

To provide voice services for use on voice-enabled devices such as Amazon Alexa and Google Home

Features

  • Voice engagement
  • Interactive experiences
  • Audio content management
  • Custom development of voice application(s)
  • Strategic consultancy, planning and requirements gathering

Benefits

  • Manage voice experiences
  • Create voice application
  • Manage audio content within voice applications
  • Report on voice interaction and statistics
  • Provide operational efficiencies
  • Provide deep business intelligence and insights
  • Provide enhanced user experiences

Pricing

£80.00 to £120.00 a unit an hour

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at richard@vocala.co. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 12

Service ID

1 3 7 5 9 3 0 0 6 0 7 0 5 8 2

Contact

Vocala Ltd. Richard Matthews
Telephone: 07494514704
Email: richard@vocala.co

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
Service constraints
No
System requirements
None

User support

Email or online ticketing support
Email or online ticketing
Support response times
2hours mon - fri
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
We provide access to technical account manager
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Commencing in the kick-off phase, we will work closely with the client to understand the best solution for the product or service we are developing.
Service documentation
No
End-of-contract data extraction
We provide full data exports to clients.
End-of-contract process
We provide a reconciliation budget and end of project debrief and report.

Using the service

Web browser interface
No
Application to install
No
Designed for use on mobile devices
No
Service interface
No
API
No
Customisation available
Yes
Description of customisation
Bespoke development

Scaling

Independence of resources
We work with AWS to provide your own servers that will be built to meet the demand of your product.

Analytics

Service usage metrics
Yes
Metrics types
Data anyaltics to include data usage, retention and campaign information. Dependant on the service and product we can customise data measurement.
Reporting types
  • Real-time dashboards
  • Regular reports

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • EU-US Privacy Shield agreement locations
User control over data storage and processing locations
No
Datacentre security standards
Managed by a third party
Penetration testing frequency
Less than once a year
Penetration testing approach
In-house
Protecting data at rest
Physical access control, complying with another standard
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Depending on the service. We provide a variety of data options.
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
Other
Other protection between networks
Customers environments are segregated.
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Due the Alexa product being based on consumer platforms availability can't be guaranteed, however, it has been shown over the last few years to be highly available
Approach to resilience
Our service and product is built using AWS best practices.
Outage reporting
The service is monitored by ourselves and any outage reported directly to a point of contact within the users organisation

Identity and authentication

User authentication needed
No
Access restrictions in management interfaces and support channels
Username and password with two-step verification if required.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Access to user activity audit information
You control when users can access audit information
How long user audit data is stored for
Between 6 months and 12 months
Access to supplier activity audit information
You control when users can access audit information
How long supplier audit data is stored for
Between 6 months and 12 months
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
We follow ISO27001 standards - although we are not certified.
Information security policies and processes
We have internal processes that support our approach to security and details and best practises are listed in our handbooks.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
We maintain a change log of environmental controls and operate releases through our release manager.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Multiple tiers of vulnerability management. The Product Security team ensures the security of the system, consults with R&D teams and partners, and protects customer data.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
We record all login attempts
Incident management type
Supplier-defined controls
Incident management approach
Standard incident management

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Pricing

Price
£80.00 to £120.00 a unit an hour
Discount for educational organisations
Yes
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at richard@vocala.co. Tell them what format you need. It will help if you say what assistive technology you use.