Robotic Process Automation (RPA) Software | Cross-Platform (Windows, Mac & Linux)
T-Plan's Cross-Platform RPA Automation Software can run the same scripts across different devices. Robot is a highly flexible, easy to use, image-based GUI automation tool that creates automated scripts and exercises applications in the same way as an end-user. Robot automates all major systems (Windows, Mac, Linux), plus mobile devices.
Features
- Automate GUI actions across any System and any Device
- Intuitive UI for both technical and non-technical staff
- Cross-Platform Support for Windows, Mac and Linux
- Software Robots execute business steps identical to a human user
- Record & Playback Automation with Low Code or No Code
- Surface Automation across every Browser & Technology
- No API or Backend Code, operates as Front End Access
- Open architecture with extension interface allows easy customisation
- Quick start-up and simple to use saving time and money
- Real-Time Web Management Reporting and Charting
Benefits
- Saving days per week per user; saving time & effort
- 6 hour process now takes 10 minutes; saving money
- Reliable and repeatable automated actions runs 24/7
- GUI Automation allows Human Like Execution
- Automate manual, repetitive processes with software robots
- Record & Playback allows for repeatability of user actions
- Easy to use allows for fast script automation generation
- Business led, allowing end to end change program digital transformation
- Automation events driven by data feeds; allows integration
- GUI automation interacts with your business sponsor and development teams
Pricing
£2,000 to £4,000 a licence a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
1 1 3 8 1 1 5 6 3 8 8 9 8 1 2
Contact
T-Plan Limited
Charles Wheeler
Telephone: 0330 120 0875
Email: cwheeler@t-plan.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Service constraints
-
Our RPA Automation Solution uses a Java client solution that records and playbacks user actions in the same manner as a user/human would.
This therefore requires access to a GUI front end user interface to drive the application for robotic process automation. This terminal can be virtual over a network to a Virtual Machine or via RDP etc. or in-situ at a users physical desktop. Can be Windows, Mac or Linux based. - System requirements
-
- Internet or LAN access
- Access to a desktop or mobile GUI
- Mac, Windows or Linux supported
- Android or iOS supported
- Java
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
In addition to email and phone support we provide an online help desk portal where existing customers can raise incidents or questions.
We offer a response time within 3 hours for Urgent requests and 3 other levels of response time for other decreasing severity incidents.
Support response times may differ outside core business hours. as above the online Helpdesk facility is available where cases can be logged 24/7, and any emails would be logged and picked up the first business day.
All customers have named Customer Service Managers. - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- Web chat is accessible via every page on our website. Users can chat or raise tickets via web email.
- Web chat accessibility testing
- None or don’t know
- Onsite support
- Yes, at extra cost
- Support levels
-
We offer one very high standard support level to all of our customers alike.
Support is included in the license price of the software, (20% the license price); paid annually.
SLA's are customised to customer specific requirements. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
We provide online training, a very detailed user documentation portal, and onsite training when requested.
We also provide one to one virtual meetings and product demonstrations as applicable.
A key differentiator of our product is the ease of use of our application. Utilising the record and playback feature together with the low code / no code wizards, and intuitive user interface, you can be up and running in no time.
The application itself is installed within seconds and runs with the same interface on Mac, Windows and Linux; meaning no new training required for working in other environments. - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
-
The customer can setup an on-premise solution if a cloud delivery has been orchestrated.
As the automation solution runs on the desktop, all automation intellectual property and data, remains the ownership of the customer custodian.
All processes from the web portal can be downloaded and if cloud based databases are used then backups can be provided. - End-of-contract process
- We work with the customer to provide all automation property and assets so that they are retained by the client when the service is terminated.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Linux or Unix
- MacOS
- Windows
- Other
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
-
Mobile connections to iOS and Android devices are supported via the desktop application solution. The desktop application drives the automation of the mobile devices.
Management portal dashboard reporting can be viewed from mobile browsers. - Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
-
Our solution offers both Java API and CLI control.
CLI allows for complete control over the application for execution of automation scripts and complete business process runs, together with results status.
The API allows Java apps, extensions and plugins to be integrated and developed by the end user. This interface is fully documented and supported.
Additionally we also support a Rest API for the web management portal allowing execution of automation workflows and retrieval of work item status, and result reporting. - API documentation
- Yes
- API documentation formats
-
- HTML
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
- Customisation of the application can be achieved by adding extensions and plugins to the code on startup to allow integration to other systems or to perform additional actions within the product.
Scaling
- Independence of resources
- Our workflow engine can be load balanced, mico-serviced and clustered dependent on perceived performance. We monitor the service levels and can scale accordingly.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Full automation status and result reporting. Delivered as a html report and also in a web management portal dashboard. Dashboard reporting delivers information based on for example status of work item executions, automation processes, queued items availability and completed tasks etc.
Dashboard can be customised and exported to PDF. - Reporting types
-
- API access
- Real-time dashboards
- Regular reports
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
-
Data can be exported in CSV or PDF format. Automation scripts are file based and as such can be read by a text editor.
Other information can be exported to Excel or Word using the application. - Data export formats
-
- CSV
- Other
- Data import formats
-
- CSV
- Other
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
T-Plan maintains disaster recovery and emergency contingency plans. These are tested.
Cloud hosted service is subject to Microsoft Azure SLA.
On premise hosted solutions is subject to Customer SLA.
SLAs are agreed with the client based on specific business requirements. - Approach to resilience
-
Robotic Process Automation data and intellectual property relating to the systems being automated are held within the client's network and or infrastructure. A duplicate copy is also held and uploaded onto the cloud so there is always a copy held in 2 different places.
Availability of that data is controlled by the customer. - Outage reporting
- We use a centralized notification system to deliver service related communications about application changes, outages and scheduled maintenance where and when applicable to that customer.
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- User authentication allows the assignment of roles to groups of users. Permissions are set at the group level and define access to certain sectors and pages of the application. Other permissions define the ability to read, read write, schedule and execute, or admin type functionality.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- Information and Data Security is documented as a policy and is available on request. The policy forms part of the Employee Handbook and every member of T-Plan staff is made aware of the process and steps required to raise and manage incidents.
- Information security policies and processes
- Information Security Policy is available on request
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
All non routine changes go through change control requiring approval and verification post implementation. Major updates are also announced in release notes.
Our development teams follow an an Agile methodology for delivery and therefore can respond quickly and efficiently to changes from our business customers.
A change request can come into our processes from many sources (email, helpdesk etc) and from there enter the product backlog as user stories. These are tracked and delivered via a kanban board and tested and released when verified. A full regression test pack is maintained at all times. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Penetration tests are scheduled before and after each release. Our development schedule includes plans to correct or mitigate any findings in immediate maintenance release.
T-Plan also conducts vulnerability scans. Our customers conduct periodic vulnerability scans at a level of frequency dictated by their security policies and our policy is to correct critical vulnerabilities immediately. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
We work with Customers to define which requirements need to be met and the resulting protective monitoring process is designed to satisfy their demands.
In the event of a breach we use emergency and disaster recovery plans to prevent data loss or corruption. - Incident management type
- Supplier-defined controls
- Incident management approach
-
Customers can raise and track incidents via our online Helpdesk, or use email or phone.
Once the issue has been rectified and contained the incidents are updated once testing procedures have been satisfied.
Incidents raised are highlighted in priority in our incident system and have a dedicated swim lane through the backlog. Multiple incidents are sorted and resolved as per severity and priority.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Covid-19 recovery
-
Covid-19 recovery
T-Plan maintains a Risk Assessments document for dealing with the current Covid-19 situation in the workplace.
As a T-Plan employee, you must protect other people from harm. This includes taking reasonable steps to protect yourself, and others from coronavirus.
You must:
• identify what work activity or situations might cause transmission of the virus
• think about who could be at risk
• decide how likely it is that someone could be exposed
• act to remove the activity or situation, or if this isn’t possible, control the risk. - Equal opportunity
-
Equal opportunity
T-Plan is an equal opportunities employer and is committed to opposing all forms of discrimination, victimisation or harassment in the workplace. - Wellbeing
-
Wellbeing
T-Plan aims to ensure that all activities carried out on its premises or undertaken by its staff (or their agents) are managed in such a manner so as to avoid, reduce, or control, all foreseeable risks to the health & safety of any person(s) who may be affected by such activities to a tolerable level.
Pricing
- Price
- £2,000 to £4,000 a licence a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
-
T-Plan offers free trial options of all our software solutions. Free trials can be conducted on-premise or as a cloud hybrid POC.
Time periods are normally 2 weeks but extended time can be agreed with the customer. - Link to free trial
- https://www.t-plan.com/free-trial/