ECKOH UK LIMITED

Email

Omni Email is a powerful and flexible inbound and outbound email handling system that is accessed from within the Omni-Channel console. It can handle inbound mails and web contact forms securely and quickly from all major email systems – from Google Mail to Exchange - and bulk outbound too.

Features

  • Supports all major secure email server connections
  • Integrates with knowledge base
  • Full indexing of emails in back office
  • Allows outbound mail sending or forwarding of external mails

Benefits

  • Web agents handle emails and web forms in real time
  • Assigns priorities based on pre-set rules
  • Skill based routing of emails to departments or individuals

Pricing

£85 per licence per month

Service documents

G-Cloud 10

364545257185493

ECKOH UK LIMITED

Ross Sampson

01172 141 452

ross.sampson@eckoh.com

Service scope

Service scope
Software add-on or extension Yes, but can also be used as a standalone service
What software services is the service an extension to All other services
Cloud deployment model Private cloud
Service constraints None that aren't browser related (such as using old browser versions).
System requirements
  • Windows 7 or above
  • Mac OSX 10.8 or above
  • IE9 or above
  • Google Chrome (30 or above)
  • Mozilla Firefox (27 or above)
  • Opera (22 or above)
  • Safari (6 or above)

User support

User support
Email or online ticketing support Email or online ticketing
Support response times There are different service levels depending on the level of SLA required for the contract. From 9-5 Mon-Fri to 24/7
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support Web chat
Web chat support availability 24 hours, 7 days a week
Web chat support accessibility standard WCAG 2.0 AA or EN 301 549 9: Web
Web chat accessibility testing We use Dragon Naturally Speaking for assistive testing.
Onsite support Yes, at extra cost
Support levels Cover 1 - Charged at 5% of annual service cost, payable in advance Monday to Friday 09.00 – 18.00, excluding UK public holidays to include help desk telephone support providing user assistance and fault reporting, and resolution within SLA. Cover 2 – Charged at 8% of annual service cost, payable in advance Monday to Saturday 09.00 – 18.00 excluding UK public holidays to include help desk telephone support providing user assistance and fault reporting and resolution within SLA. Cover 3 – Charged at 10% of annual service cost, payable in advance Monday to Saturday 24 hour a day (24/6) to include help desk telephone support providing user assistance and fault reporting and resolution within SLA. Cover 4 – Charged at 15% of annual service cost, payable in advance Seven days a week 24 hours a day (24/7/365) to include help desk telephone support providing user assistance and fault reporting and resolution within SLA. Other maintenance schedules can be agreed upon request.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started We provide complete end to end account management, onsite and online training and online user documentaion
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction This can be a manual process via the API or console or they can request this as a mass transfer as required by their security/business requirements.
End-of-contract process 3 months notice

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Mobile has different collapsed styling
Accessibility standards WCAG 2.0 AA or EN 301 549
Accessibility testing Tested with Dragon Naturally Speaking
API Yes
What users can and can't do using the API You can harvest data from the API, or, for bespoke implementations handle chats via the API using your own application/interface.
API documentation Yes
API documentation formats HTML
API sandbox or test environment Yes
Customisation available Yes
Description of customisation Front end can be completely skinned by the client and their design team. They provide the design to us as part of implementation and we apply. This can be modified going forward as needed by the client.

Scaling

Scaling
Independence of resources Our systems are constantly monitored and never exceed 60% of system capacity. When 60% is reached, more containers are added horizontally to scaled the platform in real time without affecting service uptime.

Analytics

Analytics
Service usage metrics Yes
Metrics types We provide many metrics based on the customer experience (tracking activity on the website) along with performance metrics for agents, and general 'overview' information. We also provide customer feedback via online surveys.
Reporting types
  • API access
  • Real-time dashboards
  • Reports on request

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Supplier-defined controls
Penetration testing frequency At least every 6 months
Penetration testing approach ‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest Physical access control, complying with another standard
Data sanitisation process Yes
Data sanitisation type Explicit overwriting of storage before reallocation
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach Users can export as JSON over the API or CSV via the console. Other methods are available such as mySQL dump - this would need to be requested separately and may incur additional cost.
Data export formats
  • CSV
  • Other
Other data export formats
  • JSON
  • MySQL Dump
Data import formats
  • CSV
  • Other
Other data import formats
  • JSON
  • MySQL Dump

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability We support 99.99% uptime as part of our SLA, but for the last 12 months have achieved 100% uptime. Users are refunded on a pro-rate basis for any time this is exceeded. We have never had to perform any refunds.
Approach to resilience This information is available on request.
Outage reporting There is a public dashboard for this, along with account management who will update via email.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • Username or password
  • Other
Other user authentication Can be setup to work only to pre-defined IP addresses as required.
Access restrictions in management interfaces and support channels User roles define the level of access any user will have to the system. User actions when authenticated are recorded for audit purposes.
Access restriction testing frequency At least every 6 months
Management access authentication
  • Username or password
  • Other

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 British Assessment Bureau
ISO/IEC 27001 accreditation date 23/09/205
What the ISO/IEC 27001 doesn’t cover Nothing
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification Yes
Who accredited the PCI DSS certification Verizon
PCI DSS accreditation date 16/09/2010
What the PCI DSS doesn’t cover Nothing. Available via our parent company Eckoh
Other security certifications Yes
Any other security certifications
  • IASME
  • Cyber Security Essentials

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes For ISO27001 we have to show our compliance with our own ISMS which includes a complete Information Security Policy. This is escalated to the service desk internally and externally and then up through the management layer to the board.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach We adhere to our clients change management processes as required, either using ITIL or PRINCE2 as preferred by our clients. Changes are always impacted for risk and effort by the responsible area and fed back to all stakeholders via an IA document prior to work being scheduled.
Vulnerability management type Supplier-defined controls
Vulnerability management approach We have information about potential threats from multiple online sources including security providers, blogs, forums and other community areas for our application stack. There is a 2 weekly patching cycle, and sooner if threats are discovered or announced.
Protective monitoring type Supplier-defined controls
Protective monitoring approach We use web application firewalls and intrusion detection systems to identify potential compromises. These are alerted immediately to system admins who would assess and action.
Incident management type Supplier-defined controls
Incident management approach We have pre-defined processes as part of our ISMS users report incidents to our 24/7 service desk who also provide reports to clients about incidents. This may also be provided via the account manager.

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £85 per licence per month
Discount for educational organisations No
Free trial available No

Documents

Documents
Pricing document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑