Skip to main content

Help us improve the Digital Marketplace - send your feedback

20ROBOTS TECHNOLOGIES S.R.L.

Robotic Process Automation (RPA) Solutions

Our service provides Robotic Process Automation (RPA) solutions leveraging UiPath and Robocorp platforms. We specialize in RPA implementation, AI integration, and data ingestion, optimizing business processes for efficiency and scalability.

Features

  • Guided Digital Transformation From Concept to Implementation
  • Continuous Productivity Boosts Output and Efficiency
  • Precision Execution of Human-Like Tasks
  • Operations-Controlled Business-Driven Virtual Workforce
  • Agile, Minimal Disruption IT Integration
  • Cost-Reducing Optimized Process Automation
  • Adaptable, Transparent Business Automation
  • Cloud or On-Premise Automation Deployment Options
  • Comprehensive Automation for All Office Operations
  • Optimize Workflows with Expert Automation Consulting

Benefits

  • Faster Outputs with Automated Workflow Acceleration
  • Minimize Errors, Enhance Reliability in Repetitive Tasks
  • Free Staff for Higher-Value Tasks, Boost Productivity
  • Reduce Costs by Automating Routine Tasks
  • Continuous Workflow with 24/7 Robot Operations
  • Adjust Automation with Business Growth, Scale Easily
  • Improve Morale with Fewer Mundane Tasks
  • Quick Data Analysis for Better Decisions
  • Seamlessly Integrate with Existing Systems
  • Streamline Process Discovery and Automation Implementation

Pricing

£7,000 to £18,000 a licence a year

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at ciprian.caprioara@20robots.tech. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

1 2 7 1 6 4 3 0 2 8 2 4 4 6 4

Contact

20ROBOTS TECHNOLOGIES S.R.L. Caprioara Ciprian
Telephone: +40749547169
Email: ciprian.caprioara@20robots.tech

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Our RPA service seamlessly integrates with major ERP, CRM, and HRMS platforms, including SAP, Salesforce, and Workday. It enhances financial systems, healthcare software, and cloud services, automating tasks like data entry, scheduling, and report generation across diverse business environments.
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints
Our service is designed to be highly accessible and flexible, with no fixed maintenance windows, no geographic limitations. We strive to provide a seamless experience without hardware or software requirements beyond basic internet access.

Customer support is available 9:00 AM to 5:00 PM EST, Monday through Friday. Weekend support is only available for critical issues and must be scheduled in advance.
System requirements
  • Internet Connection: Reliable, high-speed internet connection required.
  • Browser Compatibility: Latest versions of Chrome, Firefox, or Edge recommended.
  • Bandwidth: Sufficient bandwidth to support high volumes of data transmission.
  • Screen Resolution: Minimum resolution of 1280x1024 for optimal interface display.

User support

Email or online ticketing support
Yes, at extra cost
Support response times
Our typical response time is within an 1 hour Monday-Friday 9- 6 pm. Our typical response time is within an 2 hour Saturday - Sunday
Willing to tailor the customer support to meet the client's needs. Issues will be Triage according to client's specification
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), 7 days a week
Web chat support
Yes, at an extra cost
Web chat support availability
9 to 5 (UK time), 7 days a week
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
Via a web page. The user can submit issues and raise a ticket
Web chat accessibility testing
N/A
Onsite support
Yes, at extra cost
Support levels
1. Basic Support:
* Description: This level is suitable for resolving common, non-urgent issues and learning from other users.
* Cost: Included with all service subscriptions.
2. Standard Support:
* Description: Includes email and ticketing support with regular business hours response. This tier offers access to software updates and security patches.
* Cost: 10% of the monthly subscription fee.
3. Advanced Support:
* Description: Provides faster response times and phone support. This level is intended for more complex issues that require prompt attention, with a response time of up to 12 hours.
* Cost: 20% of the monthly subscription fee.
4. Enterprise Support:
* Description: This top-tier support includes all Premium features plus a dedicated Technical Account Manager (TAM) or a Cloud Support Engineer who provides personalized service, strategic planning, and proactive management of your RPA ecosystem.
* Cost: Custom pricing based on specific customer needs and scale of deployment.
Additional Support Personnel:
* Technical Account Manager (TAM): Available at the Enterprise support level, the TAM provides strategic oversight and helps align RPA capabilities with business goals.
* Cloud Support Engineer: Also available for Enterprise clients, focusing on technical challenges and ensuring optimal performance of the RPA solutions.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Our RPA service, in partnership with platforms like Robocorp and UiPath, provides users with a comprehensive suite of training and support resources to empower them on their automation journey. While these platforms offer excellent training modules and documentation, our service goes beyond by offering specialized expertise tailored to your industry needs. Our team of experienced RPA specialists provides personalized consultations and hands-on guidance to help you strategize and implement automation solutions effectively within your organization
Service documentation
Yes
Documentation formats
  • HTML
  • ODF
  • PDF
End-of-contract data extraction
Self-Service Data Export: Users can initiate a data export directly from their account dashboard. We provide easy-to-use tools that allow users to select the data they want to export and generate downloadable files in standard formats.
Assisted Data Extraction: For users who require assistance or have specific requirements, our support team is available to guide them through the data extraction process. Users can reach out to our support channels, including email or live chat, to request assistance.
Custom Extraction Services: In cases where users have complex data structures or require custom data extraction solutions, we offer bespoke extraction services tailored to their needs. Our team works closely with users to understand their requirements and develop customized extraction processes.
Data Retention Period: Additionally, we ensure that users have access to their data for a specified period after the contract ends, allowing them ample time to complete the extraction process at their convenience.
End-of-contract process
At the end of the contract, we facilitate a seamless transition for our users. Users retain access to their automation projects and data, allowing them to export their workflows and related data if needed. Account access is deactivated upon contract expiration, but users can explore renewal options to continue using our platform.

Included in the contract price are access to our RPA platform, basic training materials, and standard customer support during business hours. Regular software updates and maintenance are also covered. Additional costs may include advanced training programs, personalized support services, custom development or integration, and any usage-based fees for exceeding predefined limits.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
  • Linux or Unix
  • MacOS
  • Windows
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Mobile Service: Designed for on-the-go monitoring and control of automated processes. Features a simplified user interface optimized for smaller screens and touch interactions. Provides alerts and status updates, with the capability to start, stop, and monitor bots. However, it may not support the full range of configuration or complex scripting available on the desktop version.
Desktop Service: Offers full functionality with advanced features for creating, testing, and deploying automation scripts. Includes comprehensive tools for managing large-scale deployments and detailed analytics. Suitable for complex process configuration and extensive customization.
Service interface
Yes
User support accessibility
WCAG 2.1 A
Description of service interface
We offer a comprehensive, web-based interface that allows users to design, deploy, and manage automation bots with ease. It features intuitive navigation, a drag-and-drop bot designer, real-time monitoring dashboards, and detailed analytics tools. Designed for both technical and non-technical users, our interface supports seamless integration and management of automated workflows across various systems.
Accessibility standards
WCAG 2.1 A
Accessibility testing
Internal Testing: Our team conducts internal evaluations to identify and address common accessibility issues, focusing on key features and functionalities.
Consultation with Experts: We consult with accessibility experts and leverage industry best practices to inform our design decisions and prioritize accessibility enhancements.
API
Yes
What users can and can't do using the API
Our API enables users to automate setup and modification processes, making it especially beneficial for RPA implementations with Robocorp and UiPath. Users can initiate the service setup through the API by sending configuration details (like user roles, permissions, and system parameters) in a JSON format to our endpoint. This allows for seamless integration into existing RPA workflows.

Changes to the service can also be made via the API, such as updating user permissions, adding new functionalities, or modifying system settings. Users can make these adjustments by submitting PATCH requests with the necessary updates outlined in JSON.

However, there are limitations to ensure system security and integrity. For instance, critical infrastructure changes, such as server reconfigurations or database schema modifications, must be handled directly by our support team to prevent unauthorized access and potential disruptions. Additionally, rate limits are imposed to prevent API abuse, ensuring fair usage and system stability for all users.
API documentation
Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
What can be customized:
* Bot Creation: Users can customize and create their own bots to automate specific processes tailored to their business needs. This includes defining workflows, configuring inputs and outputs, and setting up decision-making logic.
* User Interface: Customization options are available for the user interface, allowing users to personalize their dashboard layout, widgets, and data visualization preferences.
* Integration: Users can customize integrations with other systems and applications to streamline data exchange and automate cross-platform workflows.
* Permissions and Access Control: Administrators can customize user roles, permissions, and access levels to control who can view, edit, and execute automation processes.
How users can customize:
* Drag-and-Drop Interface: Bot creation is facilitated through a user-friendly drag-and-drop interface, enabling non-technical users to customize automation workflows easily.
* Configuration Settings: Customization options are accessible through intuitive configuration menus and settings panels, allowing users to tailor automation parameters without coding or scripting.

Who can customize:
* Administrators: Typically, administrators or designated power users have the authority to customize and configure the service according to organizational requirements.
* End Users: Depending on permissions, end users may have limited customization capabilities, such as configuring personal dashboard preferences or creating simple automation rules.

Scaling

Independence of resources
To ensure users are not affected by the demand placed on our service by other users, we employ robust resource allocation and management strategies:
1. Resource Isolation: Each user's automation processes are executed in isolated environments, preventing interference or performance degradation caused by other users' activities.
2. Scalability: We can dynamically scale resources based on demand, ensuring consistent performance and responsiveness.
3. Load Balancing: We implement load balancing techniques to evenly distribute workload across servers.
4. Monitoring and Optimization: We continuously monitor resource usage and performance metrics, proactively optimizing our infrastructure to maintain high availability and reliability for all users.

Analytics

Service usage metrics
Yes
Metrics types
We offer comprehensive service usage metrics, including bot execution times, frequency of automation runs, error rates, and resource utilization. These metrics provide insights into the efficiency and effectiveness of automation processes, enabling users to optimize workflows and identify areas for improvement.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
UiPath, Robocorp

Staff security

Staff security clearance
Staff screening not performed
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
European Economic Area (EEA)
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
Never
Protecting data at rest
Encryption of all physical media
Data sanitisation process
No
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Users can export their data seamlessly through our platform. We offer a user-friendly data export feature accessible from the dashboard. Users can select the data they wish to export, such as automation workflows and related data, and generate downloadable files in standard formats. Our intuitive interface ensures a straightforward process, allowing users to retain full control and ownership of their data even after their contract ends.
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats
  • Excel (XLSX)
  • JSON (JavaScript Object Notation)
  • XML (eXtensible Markup Language)
  • PDF (Portable Document Format)
  • Database Export
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats
  • Database Export
  • XML (eXtensible Markup Language)
  • PDF (Portable Document Format)
  • XML (eXtensible Markup Language)
  • JSON (JavaScript Object Notation)
  • Excel (XLSX)

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
At this stage, we don't have formal SLAs in place. However, our goal is to maintain a high level of availability for our automation solutions, aiming for uptime levels that meet or exceed industry standards.

In the event of any service interruptions, we're dedicated to promptly addressing issues and minimizing downtime. As we grow and mature, we'll explore the possibility of implementing formal SLAs and refund policies to provide our users with assurance and compensation for any service disruptions experienced.

Our focus remains on delivering value and reliability to our users as we continue to evolve and enhance our automation capabilities with Robocorp and UiPath.
Approach to resilience
It’s available on request
Outage reporting
Our service employs multiple channels to report outages promptly and transparently to our users:

Public Dashboard: We maintain a public dashboard that displays real-time status updates regarding the availability and performance of our service. Users can access this dashboard to stay informed about any ongoing incidents or outages.
API Integration: We offer an API that allows users to programmatically retrieve outage information and status updates. This integration enables users to incorporate outage notifications directly into their monitoring systems or dashboards for seamless visibility.
Email Alerts: In addition to the public dashboard and API, we send email alerts to registered users in the event of any outages or incidents affecting our service. These alerts provide detailed information about the nature of the outage, estimated resolution times, and any actions users may need to take.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
Access restrictions in management interfaces and support channels are implemented through several measures:

Role-based Access Control (RBAC): Access is granted based on predefined roles and permissions, ensuring that only authorized personnel can perform specific actions.
Multi-factor Authentication (MFA): Users are required to authenticate using multiple factors such as passwords, biometrics, or security tokens to access management interfaces and support channels.
IP Whitelisting: Access is restricted to specific IP addresses or ranges, limiting access to authorized networks or locations.
Encryption: Data transmitted through management interfaces and support channels is encrypted to prevent unauthorized interception or access.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
We take a proactive approach to security governance, implementing industry best practices and continuously monitoring and enhancing our security measures. Our approach includes regular risk assessments, security training for staff, robust access controls, and ongoing security audits to ensure the integrity and confidentiality of our systems and data.
Information security policies and processes
We prioritize information security through streamlined policies and processes that align with our size and operational needs. Our reporting structure typically involves a designated individual or team responsible for overseeing security measures, often integrated within our IT or operations department.

To ensure policies are followed effectively within our company:

Clear Communication: We emphasize clear communication of security policies to all employees, ensuring they understand their roles and responsibilities in maintaining security.
Regular Training: We conduct periodic security awareness training sessions to educate employees about security best practices and ensure they are equipped to adhere to policies.
Simplified Procedures: We implement straightforward procedures for enforcing security policies, focusing on practical measures that are easy to understand and implement within our operational context.
Monitoring and Review: We regularly review and assess our security measures to identify any gaps or areas for improvement, ensuring our policies remain relevant and effective.
Vendor Management: If applicable, we ensure that third-party vendors or service providers adhere to security standards through contracts and agreements.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
We employ a streamlined configuration and change management approach to ensure the integrity and security of our services:

Tracking Components: We utilize a centralized system to track the lifecycle of service components, including version control and documentation of changes.
Security Impact Assessment: Changes undergo rigorous assessment for potential security impacts before implementation. This includes vulnerability scanning, risk analysis, and adherence to security best practices to mitigate any potential risks associated with changes.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Our vulnerability management process ensures proactive identification and mitigation of potential threats:

Threat Assessment: We conduct regular vulnerability scans and risk assessments to identify potential threats to our services.
Patch Deployment: Patches and updates are deployed promptly upon release, prioritizing critical vulnerabilities to minimize exposure.
Information Sources: We rely on reputable sources such as security advisories from vendors, industry-specific threat intelligence feeds, and security communities to stay informed about potential threats and vulnerabilities.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Our protective monitoring processes ensure swift detection and response to potential compromises:

Identification: We employ real-time monitoring tools to detect suspicious activities, unauthorized access attempts, and anomalous behavior.
Response: Upon identifying a potential compromise, we initiate incident response procedures, including containment, investigation, and remediation.
Response Time: We prioritize rapid response to incidents, aiming to mitigate risks and minimize impact within minutes or hours, depending on the severity of the compromise.
Incident management type
Supplier-defined controls
Incident management approach
Our incident management approach encompasses pre-defined processes for common events, ensuring swift and effective response:

Pre-defined Processes: We have established procedures for common incidents, outlining steps for containment, investigation, and resolution.
Incident Reporting: Users report incidents through designated channels, including email, phone, or an online reporting portal.
Incident Reports: We provide incident reports to affected users promptly, detailing the nature of the incident, actions taken, and preventive measures. Reports are communicated through email notifications or posted on a dedicated incident management portal.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

Our service prioritizes energy efficiency and sustainability, reducing carbon footprint and environmental impact through cloud-based solutions that minimize hardware requirements and energy consumption.

Covid-19 recovery

We support Covid-19 recovery efforts by providing remote working solutions and digital automation tools that enhance operational resilience, facilitate remote collaboration, and streamline processes for public sector organizations adapting to new ways of working.

Tackling economic inequality

Our service promotes economic inclusion by offering affordable, scalable solutions that enable smaller organizations and underserved communities to access advanced technology capabilities, fostering economic growth and reducing inequality.

Equal opportunity

We champion diversity and inclusion in our workforce and partnerships, ensuring equal opportunities for all individuals regardless of background, gender, ethnicity, or socioeconomic status.

Wellbeing

Our service prioritizes user experience and accessibility, promoting employee wellbeing by reducing stress and improving work-life balance through intuitive interfaces, streamlined workflows, and support for flexible working arrangements.

Pricing

Price
£7,000 to £18,000 a licence a year
Discount for educational organisations
Yes
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at ciprian.caprioara@20robots.tech. Tell them what format you need. It will help if you say what assistive technology you use.