Avenir Business Solutions Ltd


A chatbot is a type of bot designed to interact with humans conversationally, based on its programming. They automate the process of communicating in an attempt to create the best user experience.

We help in building and developing bots. We create chatbots/ Bots that can contextualise and perform multitasks.


  • Developing Bot and administering
  • AI rich Chatbots
  • IVR Voice support
  • Chatbot Tasks
  • Smart Alerts
  • Advance control over importing and exporting Capabilities
  • New dashboard for Universal bots
  • Additional channel support options to secure sensitive user information
  • Enhanced context switching and interruption handling
  • Generic IVR channel


  • Provides easy way to communicate
  • Customers can personalise and get timely notifications
  • Good customer service quality and faster query resolutions
  • Provides interaction in corporate tools like Workplace
  • Conversations are Secured
  • Captures and stores messages
  • Transparency in Chats, sessions
  • Controls chatbot administrators, users, approved channels and more
  • Uses built-in tools for data retention
  • A secured delegated access


£100 per user per day

Service documents

G-Cloud 9


Avenir Business Solutions Ltd

Suresh Kumar



Service scope

Service scope
Software add-on or extension No
Cloud deployment model Hybrid cloud
Service constraints Our service is Windows based
System requirements
  • Microsoft Platform
  • Cloud based

User support

User support
Email or online ticketing support Email or online ticketing
Support response times It is 24 hours turn around time. But on weekend it will be more unless it is agreed with the client and they want the support even on weekends
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Onsite support
Support levels We provide Offshore Support, Onsite Support at client premises and Onsite Support from our premises in UK.

We provide level 1, level 2 and level 3 support. The cost varies on what option is selected.

We provide Technical Account Manager or Cloud Support Engineer.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Depending on the agreement with the client we can provide onsite or online training. We also provide user documentation.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction When the contract ends the data can be extracted to any database specified by the client. We can provide that service.
End-of-contract process Our service is quite flexible so depending on what is agreed with the client in the beginning of the contract we can go through the process at the end of the contract.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10+
  • Microsoft Edge
  • Chrome
Application to install No
Designed for use on mobile devices No
Accessibility standards None or don’t know
Description of accessibility Depending on the client requirement the service can be provided as per the needs of the client. We can tailor make the service as per the client needs
Accessibility testing Yes we have done interface testing with users and if our service is tailor made to the client specification we can do the interface testing as per the users assistive technology.
What users can and can't do using the API Using the API provided the client can pass information to & fro different system existing.
API documentation Yes
API documentation formats PDF
API sandbox or test environment Yes
Customisation available Yes
Description of customisation Reports and Forms can be customised . If it is a drag and drop kind of reports and forms it can be customised by the user themselves . If it is a bit complicated customisation then we can do it for them.


Independence of resources Depending on the usage our service is provided in such a way that the other users are not affected when the demand of our service is high


Service usage metrics No


Supplier type Reseller providing extra features and support
Organisation whose services are being resold Microsoft

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Managed by a third party
Penetration testing frequency At least every 6 months
Penetration testing approach Another external penetration testing organisation
Protecting data at rest Encryption of all physical media
Data sanitisation process No
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach Depending on what kind of data the users have we can help the client in exporting their data.
Data export formats CSV
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Availability and resilience
Guaranteed availability Depending on the client needs we work with third party suppliers who are ready to sign a back to back agreement with us as per the client needs
Approach to resilience We use third party service for datacentre setup and we ensure they are as per the client needs.
Outage reporting Email Alerts

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels Depending on the user it has be to defined in the software in the beginning as to what rights the user has and based on that the access restrictions are setup.
Access restriction testing frequency At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users receive audit information on a regular basis
How long user audit data is stored for User-defined
Access to supplier activity audit information Users receive audit information on a regular basis
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security accreditations No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance accreditation Yes
Security governance standards ISO/IEC 27001
Information security policies and processes Avenir Information Security Policy sets out requirements and proposals, relating to how:

Restricted information need to be secured from unauthorised access.
The reliability of information and information systems must be protected.
Appropriate measures must be taken to manage risks to the availability of information.
It warrants compliance with laws and the terms of contracts.
Avenir being ISO certified follows the laid down standard processes of ISO/IEC 27001 specification for designing, implementing, maintaining and updating an information security management system

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Our Configuration & Change management processes are based on the client needs.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Our Vulnerability management process is dependant on the clients need and it can be tailored as per the client.
Protective monitoring type Supplier-defined controls
Protective monitoring approach We have got protective monitoring by way of CCTV, Fingerprint scan and fobs in place and usually if there is an incident we respond immediately.
Incident management type Supplier-defined controls
Incident management approach For incident management we usually ask our clients to find out what kind of incident management process they would need in place.

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Public sector networks
Connection to public sector networks No


Price £100 per user per day
Discount for educational organisations No
Free trial available No


Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑