EncompaaS EMEA Limited

Hendrix.ai AI meeting assistant

Hendrix.ai is an automated meeting note service. Hendrix joins conference calls by dialing in like other participants, merged into telephone calls, or used on mobile or laptops to capture conversations. Hendrix delivers a transcription of the conversation and a meeting summary identifying action items and highlights.

Features

  • Meeting capture by conference call, telephone, or in-person
  • Real-time speech to text transcription
  • Automatic capture of highlights and action items in meetings
  • Capture of keywords in meetings such as people, places, etc
  • Ability to search for words and phrases in meetings
  • Delivery of meeting metrics such as number of meetings
  • Calendar synchronization for exchange and G-Suite
  • Editor for meeting transcript and summary
  • Editor for meeting attendees, organizer, and meeting title
  • Mobile application for android and IOS

Benefits

  • Automatically capture meeting conversations
  • Automatic identification of highlights and action items
  • Get an editable transcript and summary of every meeting
  • Integrate action items with popular todo list software
  • See top keywords of categories in all meetings
  • Receive a recording of every meeting and set recording retention
  • Share meeting summaries with attendees
  • Single Sign-On makes it simple to authenticate
  • Calendar synchronization automatically joins any meetings with access information
  • Meeting summaries shared automatically by email after each meeting

Pricing

£14 per person

  • Education pricing available
  • Free trial available

Service documents

Framework

G-Cloud 11

Service ID

6 6 6 0 9 5 1 1 4 5 4 0 7 2 8

Contact

EncompaaS EMEA Limited

Ian Jones

07825552434

ian.jones@encompaas.cloud

Service scope

Service scope
Software add-on or extension No
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints Hendrix.ai works with all versions of web browsers with the exception of Internet Explorer. In addition, the quality of audio capture is directly related to the accuracy of the transcript so it is advised to use Hendrix with a high quality microphone, on conference calls where all participants are dialed in, or on phone calls.
System requirements
  • Single Sign-On requires Office 365 or G-Suite subscription
  • Calendar syncronization requires Office 365 or G-Suite subscription
  • Browsers other than Internet Explorer
  • For mobile applicaiton IOS v8.0+
  • For mobile application Android v6.0+

User support

User support
Email or online ticketing support Email or online ticketing
Support response times EncompaaS will respond to support tickets based on priority. Support tickets are categorised as urgent, high, normal or low priority with response times set accordingly. This delivers timely, optimal continuity of service. Urgent: Every 1 business hours until resolved. High: Every 4 business hours until resolved. Normal: Every 2 business days until resolved. Low: Every 3 business days until resolved.
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support Yes, at an extra cost
Web chat support availability 24 hours, 7 days a week
Web chat support accessibility standard None or don’t know
How the web chat support is accessible This will be available late in 2019. Live chat will be an extra cost.User can Chat with Support experts to initiate a support call.
Web chat accessibility testing None
Onsite support No
Support levels Currently the Vendor only one level of support for Hendrix.ai and the cost is included in the licensing fee. We offer support during business hours, 5 days/week and provide both a technical account manager as well as a cloud support engineer at those times. Additional support options are available at extra cost
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started We currently offer a combination of on-site/web training for enterprise clients customized to the deployment use case and environment of the client. This is supplimented with an online knowledgebase, youtube videos, and a support FAQ.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction At the end of the contract, clients are free to receive a complete image of all available meeting recordings, transcripts, and summaries with the associated meta-data. There is no additional cost for this access.
End-of-contract process At the end of the contract, clients are free to receive a complete image of all available meeting recordings, transcripts, and summaries with the associated meta-data. There is no additional cost for this access.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Currently there are no difference between desktop and Mobile versions
Service interface Yes
Description of service interface The service interface is through a web browser, which allows the user access to their dashboard, user settings, current and previous meetings.
Accessibility standards None or don’t know
Description of accessibility The service interface is through a web browser, which allows the user access to their dashboard, user settings, current and previous meetings.
Accessibility testing None
API Yes
What users can and can't do using the API Everything that can be done via the Dashboard or Mobile app can be done via the API.
API documentation Yes
API documentation formats
  • HTML
  • PDF
API sandbox or test environment Yes
Customisation available No

Scaling

Scaling
Independence of resources Our service architecture is a suite of micro-services deployed in docker containers. This allows us to scale up and down the service capacity as demands change. We do periodic stress testing of the system to validate these systems are operating properly.

Analytics

Analytics
Service usage metrics Yes
Metrics types We can provide metrics on useage, call lengths, durration, confidence levels, dropped calls, late starts, web statistics on usage per feature.
Reports can be scheduled or requested.
Reporting types
  • Regular reports
  • Reports on request

Resellers

Resellers
Supplier type Reseller providing extra support
Organisation whose services are being resold Testfire Labs

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations Other locations
User control over data storage and processing locations Yes
Datacentre security standards Managed by a third party
Penetration testing frequency At least every 6 months
Penetration testing approach Another external penetration testing organisation
Protecting data at rest Encryption of all physical media
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach Currently data export can be done via the API or by requesting a data export by email to support.
Data export formats CSV
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability We offer a 99.9% Service Availabiltiy Guarantee during business hours. If we fail to meet that SLA in any month we will provide up to a complete refund of the service costs in that month upon written request from the client.
Approach to resilience Hendrix.ai and all of its modular components are based on a microservices architecture deployed in Docker containers. This allows the service to be easily scaled, clustered, and replicated in multiple cloud deployments across vendors and geography. Currently we are deployed in Azure across multiple locations for resiliency. Hendrix can be deployed within a clients private cloud provider environment or even on-premises depending on client preference.
Outage reporting Currently we report outages by email notification but we are moving toward a real-time service availability reporting tool built into the service dashboard as well as reported on the Hendrix.ai support page and available through the API. Historical service availability is available and will become part of the public service availability reporting tool.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Other
Other user authentication Multi factor authentication is also available where available
Access restrictions in management interfaces and support channels Where available Testfire Labs utilizes two-factor or where available multi-factor authentication to secure access to data. We also employ our encryption standards, timeouts, and inactivity resets. All workstations are locked automatically when unattended or inactive. Workstations also require a password to login and automatic logins are disabled.
Access restriction testing frequency At least every 6 months
Management access authentication 2-factor authentication

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach We operate using the principle of least privilege (PoLP) or principle of minimal privilege – only access for a resource that is absolutely required to perform routine, legitimate activities.
Information security policies and processes We are basing our security control framework around CIS 20, a practical and action oriented standard that addresses many of the industry frameworks including but not limited to SOC 1, 2, 3, ISO 27001, and NIST. This will allow us to keep our focus on building great software while also ensuring we hold ourselves to the highest standards possible. Our CTO currently owns the role of information security officer and is tasked with ensuring our employees and contractors follow our written policies and processes.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Testfire Labs utilizes a Development (DEV), Staging (STAGE), and Production (PROD) approach to migrating code from development through and into production (a release). Testfire Labs uses a secured central GIT repository. Developers create their own local copies of the repository. Changes are committed back to the central repository through a code branch. Once the changes are verified and approved by the CTO or Senior Developer they are merged to the central repository. GIT logs all changes to the code for auditing purposes.
GIT allows for unlimited rollback ability, ensuring quick rollbacks from a failed release back to a working release.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Testfire Labs process of identifying, managing, recording and analyzing security threats or incidents. The CTO (acting in the role of the CISO) will run regular monthly reports with Secure Score to ensure best practices and misconfigurations are caught in a timely fashion.
Alerts are generated when a threat to one of our environments is detected, i.e. brute force attack, actionable recommendations mitigating the threat are provided. In the event of a security breach, the CTO (acting in the role of the CISO), will assess the threat, immediately issue a ticket to remediate the issue and communicate to the affected parties.
Protective monitoring type Supplier-defined controls
Protective monitoring approach Testfire Labs leverages Azure’s Security Centre solution.
The CTO (acting in the role of the CISO) will run regular monthly reports with Secure Score to ensure best practices and misconfigurations are caught in a timely fashion.
Alerts are generated when a threat to one of our environments is detected, i.e. brute force attack, actionable recommendations mitigating the threat are provided.
Allows us to detect vulnerabilities in web applications (i.e. exposed pages and plug-ins) that are frequently targeted by attackers. Response time service level is currently a 4 hour mean-time to resolve.
Incident management type Supplier-defined controls
Incident management approach All incidents are logged to our support system, currently maintained in a 3rd party system and backed up on an hourly basis to an encrypted cloud data storage provider. Incidents are evaluated for scope and severity within 20 minutes and a response team is assigned either automatically or through management action. The CISO has established an incident response protocol and this is reviewed every quarter to ensure compliance with requirements. Users report incidents to our support team by phone or email and incident reports are generated internally, reviewed, and then distributed to affected clients by email within 72 hours.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £14 per person
Discount for educational organisations Yes
Free trial available Yes
Description of free trial The free / trial version of our product is identical to the paid version. The only limitation is the length of the trial period which is customizable but defaults to 14 calendar days.

Service documents

Return to top ↑