Browse Definitions :
Definition

24/7 Customer or [24]7 Inc

24/7 Customer is a business process outsourcing (BPO) service provider that provides customer self-service products delivered through a software as a service (SaaS) business model. 

24/7 Customer, which has been rebranded as [24]7 Inc., offers software products targeted at financial services, communications, retail, travel and technology industries. Some of these applications include bill inquiry, credit/debit card fraud alert, flight re-accommodation, inventory check and technical troubleshooting. 

[24]7 Inc. products include:

Predictive Experience (PX) platform - delivers interactive customer self-service products across online, speech, and mobile channels

PX Online - monitors visitor behavior, detects difficulties and leads customers through the system

PX Speech - automates calls

PX Mobile - allows applications on smartphone and tablet devices to automate customer interactions

PX Assist - provides an interaction platform for live chat and voice assistance.

The company manages its outsourcing services from global delivery centers in India, the Philippines and Central America. Founded by P V Kannan and Shanmugam Nagarajan in April 2000, 24/7 Customer has received venture capital from Sequoia Capital and Sherpalo Ventures. 24/7’s customer base includes Capital One, Optus, Lenovo, Sirius XM, Adobe, United and Avis. 

This was last updated in August 2012

Continue Reading About 24/7 Customer or [24]7 Inc

SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • What is cybersecurity?

    Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats.

  • DOS (disk operating system)

    A DOS, or disk operating system, is an operating system that runs from a disk drive. The term can also refer to a particular ...

  • private key

    A private key, also known as a secret key, is a variable in cryptography that is used with an algorithm to encrypt and decrypt ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data ...

  • RAID 6

    RAID 6, also known as double-parity RAID, uses two parity stripes on each disk. It allows for two disk failures within the RAID ...

  • NOR flash memory

    NOR flash memory is one of two types of non-volatile storage technologies.

Close