Zeva chatbots platform helps businesses deliver natural and intuitive services at scale using cognitive automation. We are specialized in creating true digital transformation experience.
- Visual conversational flow builder
- Natural language processing and OCR
- Rich media support
- Integration with facebook messenger, slack, email, sms, whatsapp ..etc
- Integrations with enterprise web and mobile apps, google assistant, Alexa
- File upload and download support
- Transfer to human agent
- Access control and approvals
- Complete bot life cycle management
- Personalized user experience across digital touch points
- Engage users
- Cost effective
- Improves user satisfaction
- Resolve queries instantly
- Business process automation
- Reduces support costs
£0.010 to £0.015 per instance
- Education pricing available
Avenir Business Solutions Ltd
|Service constraints||Scans on the network are performed on a quaterly basis, in case of any vulnerabilities identified a notification for maintenance schedule is sent to the buyer with all approvals from the supplier.|
|Email or online ticketing support||Email or online ticketing|
|Support response times||Response times varies based on the severity of the issues reported.|
|User can manage status and priority of support tickets||No|
|Phone support availability||9 to 5 (UK time), 7 days a week|
|Web chat support||Web chat|
|Web chat support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support accessibility standard||None or don’t know|
|How the web chat support is accessible||Web chat is available as a pop up bubble feature for users to interact with.|
|Web chat accessibility testing||Currently the feature is unavailable, however its in the pipeline to be looked into.|
|Onsite support||Yes, at extra cost|
We maintain a customer support team who takes care of the tickets raised by clients and help them to get those resolved internally.
Based on the pricing, a client can have a dedicated support resource.
|Support available to third parties||Yes|
Onboarding and offboarding
|Getting started||We provide on-site training, online training and tutorial videos, and the documentation.|
|End-of-contract data extraction||They can download all the data from the app.|
|End-of-contract process||All the data will be deleted once it is handed over to the buyer.|
Using the service
|Web browser interface||Yes|
|Using the web interface||
Users can log in into the web app to create chatbots, train and test them.
Deploy onto multiple channels like facebook messenger, Alexa, google assistant..etc
|Web interface accessibility standard||None or don’t know|
|How the web interface is accessible||The web application can be accessed over the internet.|
|Web interface accessibility testing||Speech to text|
|What users can and can't do using the API||Users can access the services through a webhook|
|API automation tools||Other|
|Other API automation tools||
|API documentation formats||HTML|
|Command line interface||No|
|Independence of resources||Server instances scale according to the demand.|
|Infrastructure or application metrics||Yes|
|Metrics types||HTTP request and response status|
|Reporting types||Real-time dashboards|
|Supplier type||Not a reseller|
|Staff security clearance||Conforms to BS7858:2012|
|Government security clearance||Up to Security Clearance (SC)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||Other locations|
|User control over data storage and processing locations||No|
|Datacentre security standards||Complies with a recognised standard (for example CSA CCM version 3.0)|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||Another external penetration testing organisation|
|Protecting data at rest||
|Data sanitisation process||Yes|
|Data sanitisation type||Explicit overwriting of storage before reallocation|
|Equipment disposal approach||In-house destruction process|
Backup and recovery
|Backup and recovery||Yes|
|What’s backed up||
|Backup controls||Users can backup the data, files and the models|
|Datacentre setup||Multiple datacentres with disaster recovery|
|Scheduling backups||Users schedule backups through a web interface|
|Data protection between buyer and supplier networks||
|Data protection within supplier network||
Availability and resilience
Critical - initial response in an hour and the workaround solution for the problem will be provided within 4 hours and a permanent fix will be provided not later than 20 days.
High - Initial response in 6 hours and the solution will be provided in 4 weeks.
Medium - Initial response in 10 hours and the solution will be provided in 8 weeks.
Low - Initial response in 2 days and the solution will be provided in 10 weeks.
|Approach to resilience||Available on request|
|Outage reporting||Email alerts|
Identity and authentication
|Access restrictions in management interfaces and support channels||User-specific privileges|
|Access restriction testing frequency||At least every 6 months|
|Management access authentication||
|Devices users manage the service through||Directly from any device which may also be used for normal business (for example web browsing or viewing external email)|
Audit information for users
|Access to user activity audit information||Users have access to real-time audit information|
|How long user audit data is stored for||User-defined|
|Access to supplier activity audit information||No audit information available|
|How long system logs are stored for||User-defined|
Standards and certifications
|ISO/IEC 27001 certification||Yes|
|Who accredited the ISO/IEC 27001||QMS|
|ISO/IEC 27001 accreditation date||02/06/2017|
|What the ISO/IEC 27001 doesn’t cover||The certification as of now does not formally mandate specific information security controls since the controls that are required vary markedly across the wide range of organizations adopting the standard.|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||Yes|
|Any other security certifications||ISO 9001:2008|
|Named board-level person responsible for service security||Yes|
|Security governance certified||Yes|
|Security governance standards||ISO/IEC 27001|
|Information security policies and processes||
We ensure that OWASP Top 10 best practices are followed during the development of the application.
Encryption of data using asymmetric keys
Maintains an audit log for the environments
Updations of servers and software as per relevance
Implementation of any changes in servers and application in production is done only after regressive testing on the lower environments
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||
Any changes to the hardware or software are implemented in the lower environments so that any vulnerabilities or potential security risks can be identified and resolved prior to production deployment.
Periodic scans are performed on network and application to ensure that the level of risk is low.
|Vulnerability management type||Supplier-defined controls|
|Vulnerability management approach||Vulnerability management team handles the responsibility of checking and identifying risks of the server configurations and application security on a regular basis. In case of any vulnerability identified, it will be assigned to the respective team and based on the impact, patches will be released.|
|Protective monitoring type||Undisclosed|
|Protective monitoring approach||
Regular monitoring of the servers to identify the suspicious logins.
Block the IPs from where suspicious login attempted.
|Incident management type||Supplier-defined controls|
|Incident management approach||
An incident management process is defined for common events.
Every client is provided with an incident reporting template.
Escalation of the incident is based on the severity of impact.
All the incidents reported are logged and maintained for the future.
|Approach to secure software development best practice||Conforms to a recognised standard, but self-assessed|
Separation between users
|Virtualisation technology used to keep applications and users sharing the same infrastructure apart||Yes|
|Who implements virtualisation||Supplier|
|Virtualisation technologies used||Other|
|Other virtualisation technology used||AWS|
|How shared infrastructure is kept separate||Different server instances for different organizations|
|Description of energy efficient datacentres||AWS datacentres use renewable energy. Combining the fraction of energy required with a less carbon-intense power mix, customers can end up with a reduction in carbon emissions of 88% by moving to the cloud and AWS.|
|Price||£0.010 to £0.015 per instance|
|Discount for educational organisations||Yes|
|Free trial available||No|