Agile Business Process UK, LIMITED

Robotics Process Automation (RPA) - UiPath

Our certified Consultants deliver best in class Automation Solutions using AI (Artificial Intelligence), Low-Code BPM (Business Process Management) , Process/Task Mining, OCR (Optical Character Recognition), ODM (Operational Decision Management) and Virtual Assistants/Chatbots. We are partnered with market leading companies such as ABBYY, AutomationHero, Bizagi, Camunda, Celonis, IBM, Soroco and UiPath.

Features

  • Cloud Hosted Robotic Process Automation (RPA)
  • Quick to deploy
  • Infinitely Scalable Cloud Platform
  • Process Identification for Robotic Process Automation and Intelligent Automation.​
  • Real-time RPA dashboard reporting
  • training on UiPath from our partner company school of automation
  • Enablement of Centre of Excellence
  • Management and support of RPA implementations
  • Annual UiPath licenses for Robotic Process Automation (RPA)
  • Virtual Workers (Robots) interact with both local and remote applications

Benefits

  • Certified UiPath Diamond Partner
  • Automate manual, repetitive processes with software robots
  • Improve your customer experience and your SLAs
  • Improve compliance and governance in your workplace
  • Become self-sufficient with your own RPA Centre of Excellence.​
  • Increased speed and agility
  • Significant reduction of error rates
  • Use RPA analytics to scale businesses accurately
  • Efficiency gains (operate 24/7 with 100% accuracy)
  • Low infrastructure costs (multiple robots on a single virtual machine)

Pricing

£880 a licence a year

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at mark.oconnor@abpconsultancy.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 13

Service ID

1 3 6 7 3 6 5 7 0 6 2 7 1 3 4

Contact

Agile Business Process UK, LIMITED Mark O'Connor
Telephone: +447464152100
Email: mark.oconnor@abpconsultancy.com

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints
Planned Maintenance and regular updates to the Cloud Platform are updated in the portal, http://status.uipath.com/.
For support exclusions, refer to the 'Support Exclusion' clause in the Support Terms available here: https://www.uipath.com/hubfs/legalspot/UiPath_Support_Terms.pdf
System requirements
  • Orchestrator (Cloud Platform) https://docs.uipath.com/cloudplatform/docs/software-requirements
  • Robots - S/w Requirements: https://docs.uipath.com/robot/docs/software-requirements
  • Robots - H/w Requirements: https://docs.uipath.com/robot/docs/hardware-requirements
  • Studio: H/w Requirements: https://docs.uipath.com/studio/docs/hardware-requirements
  • Studio: S/w Requirements: https://docs.uipath.com/studio/docs/software-requirements
  • Robots - H/w Requirements: https://docs.uipath.com/robot/docs/hardware-requirements

User support

Email or online ticketing support
Yes, at extra cost
Support response times
Our standard support response times range from 1 to 8 hours depending on the incident categorisation and prioritisation as defined in a tailored service level agreement (SLA) per service.
The tailored SLA also defines the agreed hours of support service available which can range from 24x7 to weekdays between 09:00 to 17:00 GMT.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
No
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
We have 3 support levels
1. 40 hours of support - £3,600 per quarter
2. 80 hours of support - £7,200 per quarter
3. Managed service - 1 FTE per quarter - £12,000 per quarter.

We can provide both a technical account manager and cloud support, engineer.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We can provide UiPath accredited Citizen developer, Advanced RPA developer and RPA Core Developer training courses to users through our School of Automation.
Free training is provided online by UiPath through their Academy e-learning portal.
Documentation used to install the products is provided without cost.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
From a GDPR standpoint, UiPath is considered a data processor. As such, they honor all obligations of a data processor by providing customers with full control over their data, in accordance with the product architecture and implementation.
They have ensured that they can export all of your data for you upon request. Should you close your account with UiPath Cloud Platform, or otherwise request data deletion, UiPath delete that data from their systems after the requisite 30-day soft-delete period.
They recommend customers assess if their use of UiPath's Cloud Platform is in line with their privacy obligations. For more information about UiPath’s privacy statement, how UiPath processes your data when using online services, and GDPR commitments, please visit their Privacy Policy: https://www.uipath.com/legal/privacy-policy
End-of-contract process
The license is provided based on the annual contract and cost. If the contract is not extended, the software will automatically stop working; however, data will still be available without restriction.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
Application to install
Yes
Compatible operating systems
Windows
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
UiPath has the Orchestrator Mobile App, which is available in the Apple App Store and Google Play Store. The Orchestrator is not designed to be used on mobile browsers/ web browsers. The mobile app only offers a light-view into the customers' Orchestrator instances. With the Orchestrator app, you can perform the following: Monitor Robots and Queues, search assets, start, stop, or kill jobs. With the mobile app, you can also mark processes and jobs as 'Favorite' and monitor the processes using Push notifications. These two features are not available in the Orchestrator service.
Service interface
Yes
User support accessibility
None or don’t know
Description of service interface
UiPath Cloud Platform is composed of multiple independent services, such as Orchestrator, Tenant Management, Licensing Service, and others. To provide a seamless experience, we work hard to abstract these details from the end user and offer these services through a common front-end called UiPath Cloud Portal. All the services along with the Cloud Portal are packaged together as UiPath Cloud Platform and delivered via a software-as-a-service (SaaS) model that’s built and hosted in Microsoft Azure. All services use core Azure services, including compute, storage, networking, SQL database, and identity and access management services.
Accessibility standards
WCAG 2.1 AA or EN 301 549
Accessibility testing
UiPath integrates accessibility into design, develop and quality assurance processes of its dependent products. Compliance to accessibility standards are evaluated through the use of automated testing, manual validation with assistive technologies, and support form third party source.
API
Yes
What users can and can't do using the API
From the integration perspective, for automation, Cloud Platform (SaaS) or Cloud Deployment can integrate with applications via the APIs. Orchestrator’s REST API fully programmatically supports all operations on the server-side like adding robots, processes, assets, queues and starting/ stopping/ scheduling processes. This is the standard way to integrate with external BPM or workflow tools, ERP, CRM or any other applications. Orchestrator REST API is powerful enough to integrate seamlessly with partner BPM systems or any other applications, providing 22 Custom API methods for access and control of 29 logical resources within Orchestrator (for example, Jobs, Logs, Queues, Robots and Settings). As an example of how users can use this, an external application such as a chatbot can easily trigger the robots to perform a task based on input in the chatbot. Refer here for more information on the APIs: https://orchestrator.uipath.com/reference
API documentation
Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
API sandbox or test environment
Yes
Customisation available
No

Scaling

Independence of resources
UiPath Cloud Platform has been designed to be ready for growth, with excess capacity planned according to the expected expansion of customers. As UiPath scale the cloud up and ensures it keeps its customer promises, we are re-actively monitoring the capacity based on engineering feedback. UiPath engineering team has worked on some of the world’s largest cloud platforms and understands the nuances of scaling cloud environments successfully and with high reliability.

Analytics

Service usage metrics
Yes
Metrics types
Customers can view the availability of the services and incidents that have occurred using the portal: http://status.uipath.com

Monitoring of usage and performance (response time, number of transactions, etc) is limited to UiPath's Site reliability engineers' access and this is performed to ensure continuous improvement of our service.
Reporting types
Real-time dashboards

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
UiPath

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Other
Other data at rest protection approach
Each Customer is issued their own vault that stores certificates, keys, and any other credentials working between services. Additionally, all user accounts and application accounts are tied to a customer identity that serves as a separate domain. All database storage leverages AES CBC 256 or 128 where 256 is not available. Logical separation is created by means of encryption and separate accounts between services for each customer.
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
All data is accessible to customers via the UI of the Cloud Platform. In case customer wants to export data, the request for data export must be placed with UiPath who will perform the database export.
Data export formats
Other
Data import formats
Other
Other data import formats
  • Data cannot be imported but created in the Cloud Platform.
  • Manual steps for migration from on-prem to cloud-platform are available.

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
UiPath will make commercially reasonable efforts to provide to Customer an uptime of 99.5%. Uptime is measured per service per region. The availability of the hosted service will be communicated to the Customer on the https://status.uipath.com/ webpage or through other channels, as appropriate. SLAs are specified in the user agreement.
Approach to resilience
The UiPath Cloud platform leverages Azure resiliency natively for all components. Currently replication is only between datacenters in the geographic region (within the US or within the EU). This could be expanded based on customer requirements. Refer here for more information: https://azure.microsoft.com/en-in/features/resiliency/
Outage reporting
The availability of the hosted service and any incidents/outages will be communicated to the Customer on the https://status.uipath.com/ webpage. In the status.uipath.com portal, customers can sign up for notifications and alerts via their preferred communication method: email, text, ATOM, or RSS feed.

Identity and authentication

User authentication needed
Yes
User authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
  • Other
Other user authentication
Bulk Provisioning of users is available via integration into common Identity providers such as Azure AD, LinkedIn, and Google. UiPath’s cloud platform allows for Single Sign On from a customer’s existing cloud identity platform including Azure Active Directory and Google Suite. Customers that leverage additional services such as Okta for example, are able to leverage an Azure Active Directory Tenant that supports SAML v2 federation to Okta to provide single sign on to the UiPath cloud platform. If the identity provider integrated (such as Google) requires two-factor authentication, the same applies when user logs in to the UiPath Cloud Platform.
Access restrictions in management interfaces and support channels
UiPath maintains strict control over who has access to our production environment and customer data. UiPath has a team of Site Reliability Engineers (SREs) who will monitor and manage the production environment 24x365. The SREs will require access to the production environment only in cases of maintenance and support. UiPath support operates on the principle of least privilege and has no access to the environment unless first approved by the customer. Access to production service is provided on a "just in time" basis and revoked as soon as the situation is resolved. Access requests and approvals are tracked.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password
  • Other
Description of management access authentication
We maintain strict control over who has access to our production environment and customer data. UiPath has a team of Site Reliability Engineers (SREs) who will monitor and manage production environment 24x365. The SREs will require access to the production environment only in cases of maintenance and support. UiPath support operates on the principle of least privilege and has no access to the environment unless first approved by the customer. Access to production service is provided on a "just in time" basis and revoked as soon as the situation is resolved. Access requests and approvals are tracked.

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
ISO 27001 granted by Schellman & Company.
ISO/IEC 27001 accreditation date
Accreditation issued March 20, 2020.
What the ISO/IEC 27001 doesn’t cover
The certification covers our Studio, Studio X, Robot, Agent Desktop, Orchestrator, Activity Packs and Insights with regards to our core platform. With our cloud offering, it covers our Cloud Portal, Cloud Services (Document Understanding, Computer Vision, Licensing, Orchestrator) and our Automation Hub Platform.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
Yes
Any other security certifications
  • Veracode continuous for our Cloud Platform:
  • In-progress- SOC 2 Type 2, SOC 2 Type 1
  • ISO 9001

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
UiPath has an internal Cyber Security Policy that defines the cyber security procedures and measures implemented by UiPath and subsidiaries in order to protect the confidentiality, integrity and availability of the company’s information assets in accordance with business objectives and applicable laws and regulations. UiPath’s Cyber Security governance framework is based on the following principles:
1. Ensuring security of UiPath critical information and systems is a shared responsibility.
2. The Global Cyber Security Policy is approved by UiPath management, published and communicated to all users (employees, contractors, freelancers, vendors and collaborators).
3. The policy will be subject to continuous monitoring and regular improvement and will be reviewed annually and modified if significant changes occur.
4. All data stored and processed by UiPath will be handled according to an appropriate level of confidentiality and in compliance with relevant regulatory and contractual requirements.
5. Cyber security roles and responsibilities will be defined and communicated.

This policy along with other subsequent policies are provided as training to all employees. Violation of policies lead to disciplinary action, upto termination of employment.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
For configuration changes to the service, for the regular maintenance of the cloud platform, which may happen every two weeks, updates are done in Deployment rings, and notification to customers are provided via the portal: https://status.uipath.com/ . Major updates are also announced in release notes.
For infrastructure changes, UiPath Cloud Platform is hosted in the Azure Data Centers. A change in storage location or infrastructure would be treated as an infrastructure incident triggering notification of the customer. UiPath has a dedicated team to work with Microsoft and the Azure team who would be notified immediately of any proposed change.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
For external vulnerability testing, UiPath uses the services of Veracode VAPT. UiPath Robots, UiPath Studio, and our on-premise (standalone) Orchestrator are Veracode Continuous Certified. For the Cloud Platform, we have Veracode certification, ISO 27001, and working towards SOC 2 report. We also monitor vulnerabilities introduced in our code base through third-party libraries and minimize our dependency on these libraries and corresponding exposure. We also participate in the HackerOne Bounty Program to identify vulnerabilities in our RPA Platform and surrounding ecosystem. UiPath Cloud Services use Azure's PaaS which automatically provides regular updates for known security vulnerabilities in infrastructure.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
UiPath employs a 24/7 Site Reliability Team that monitors security alerts and incidents. UiPath monitors access management, application, system, and network traffic both at the perimeter and within the environment to prevent any malicious activity and to track availability and performance.
In the event of a breach, we use security response plans to minimize data leakage, loss, or corruption. We provide transparency to our customers throughout the incident (https://status.uipath.com). Once the issue is contained, our security incident management process continues as we identify the root cause and track the necessary changes to ensure we prevent similar issues in the future.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
UiPath employs a 24/7 Site Reliability Team that monitors security alerts and incidents. UiPath monitors access management, application, system, and network traffic both at the perimeter and within the environment to prevent any malicious activity and to track availability and performance.
In the event of a breach, we use security response plans to minimize data leakage, loss, or corruption. We provide transparency to our customers throughout the incident (https://status.uipath.com). Once the issue is contained, our security incident management process continues as we identify the root cause and track the necessary changes to ensure we prevent similar issues in the future.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Covid-19 recovery

Covid-19 recovery

RPA can be programmed, executed and managed remotely allowing people to work from home and keep the infection levels low. while the business is able to automate tasks remotely 24/7.
Wellbeing

Wellbeing

RPA allows people to be more connected at work, by removing the mundane and repetitive tasks you reduce task-related frustration and empower employees to focus on more collaborative and value-creating tasks.

Pricing

Price
£880 a licence a year
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
30 day free trial

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at mark.oconnor@abpconsultancy.com. Tell them what format you need. It will help if you say what assistive technology you use.