Robotics Process Automation (RPA) - UiPath
Our certified Consultants deliver best in class Automation Solutions using AI (Artificial Intelligence), Low-Code BPM (Business Process Management) , Process/Task Mining, OCR (Optical Character Recognition), ODM (Operational Decision Management) and Virtual Assistants/Chatbots. We are partnered with market leading companies such as ABBYY, AutomationHero, Bizagi, Camunda, Celonis, IBM, Soroco and UiPath.
Features
- Cloud Hosted Robotic Process Automation (RPA)
- Quick to deploy
- Infinitely Scalable Cloud Platform
- Process Identification for Robotic Process Automation and Intelligent Automation.
- Real-time RPA dashboard reporting
- training on UiPath from our partner company school of automation
- Enablement of Centre of Excellence
- Management and support of RPA implementations
- Annual UiPath licenses for Robotic Process Automation (RPA)
- Virtual Workers (Robots) interact with both local and remote applications
Benefits
- Certified UiPath Diamond Partner
- Automate manual, repetitive processes with software robots
- Improve your customer experience and your SLAs
- Improve compliance and governance in your workplace
- Become self-sufficient with your own RPA Centre of Excellence.
- Increased speed and agility
- Significant reduction of error rates
- Use RPA analytics to scale businesses accurately
- Efficiency gains (operate 24/7 with 100% accuracy)
- Low infrastructure costs (multiple robots on a single virtual machine)
Pricing
£880 a licence a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
1 3 6 7 3 6 5 7 0 6 2 7 1 3 4
Contact
Agile Business Process UK, LIMITED
Mark O'Connor
Telephone: +447464152100
Email: mark.oconnor@abpconsultancy.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
-
Planned Maintenance and regular updates to the Cloud Platform are updated in the portal, http://status.uipath.com/.
For support exclusions, refer to the 'Support Exclusion' clause in the Support Terms available here: https://www.uipath.com/hubfs/legalspot/UiPath_Support_Terms.pdf - System requirements
-
- Orchestrator (Cloud Platform) https://docs.uipath.com/cloudplatform/docs/software-requirements
- Robots - S/w Requirements: https://docs.uipath.com/robot/docs/software-requirements
- Robots - H/w Requirements: https://docs.uipath.com/robot/docs/hardware-requirements
- Studio: H/w Requirements: https://docs.uipath.com/studio/docs/hardware-requirements
- Studio: S/w Requirements: https://docs.uipath.com/studio/docs/software-requirements
- Robots - H/w Requirements: https://docs.uipath.com/robot/docs/hardware-requirements
User support
- Email or online ticketing support
- Yes, at extra cost
- Support response times
-
Our standard support response times range from 1 to 8 hours depending on the incident categorisation and prioritisation as defined in a tailored service level agreement (SLA) per service.
The tailored SLA also defines the agreed hours of support service available which can range from 24x7 to weekdays between 09:00 to 17:00 GMT. - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- No
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
We have 3 support levels
1. 40 hours of support - £3,600 per quarter
2. 80 hours of support - £7,200 per quarter
3. Managed service - 1 FTE per quarter - £12,000 per quarter.
We can provide both a technical account manager and cloud support, engineer. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
We can provide UiPath accredited Citizen developer, Advanced RPA developer and RPA Core Developer training courses to users through our School of Automation.
Free training is provided online by UiPath through their Academy e-learning portal.
Documentation used to install the products is provided without cost. - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
-
From a GDPR standpoint, UiPath is considered a data processor. As such, they honor all obligations of a data processor by providing customers with full control over their data, in accordance with the product architecture and implementation.
They have ensured that they can export all of your data for you upon request. Should you close your account with UiPath Cloud Platform, or otherwise request data deletion, UiPath delete that data from their systems after the requisite 30-day soft-delete period.
They recommend customers assess if their use of UiPath's Cloud Platform is in line with their privacy obligations. For more information about UiPath’s privacy statement, how UiPath processes your data when using online services, and GDPR commitments, please visit their Privacy Policy: https://www.uipath.com/legal/privacy-policy - End-of-contract process
- The license is provided based on the annual contract and cost. If the contract is not extended, the software will automatically stop working; however, data will still be available without restriction.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Application to install
- Yes
- Compatible operating systems
- Windows
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- UiPath has the Orchestrator Mobile App, which is available in the Apple App Store and Google Play Store. The Orchestrator is not designed to be used on mobile browsers/ web browsers. The mobile app only offers a light-view into the customers' Orchestrator instances. With the Orchestrator app, you can perform the following: Monitor Robots and Queues, search assets, start, stop, or kill jobs. With the mobile app, you can also mark processes and jobs as 'Favorite' and monitor the processes using Push notifications. These two features are not available in the Orchestrator service.
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- UiPath Cloud Platform is composed of multiple independent services, such as Orchestrator, Tenant Management, Licensing Service, and others. To provide a seamless experience, we work hard to abstract these details from the end user and offer these services through a common front-end called UiPath Cloud Portal. All the services along with the Cloud Portal are packaged together as UiPath Cloud Platform and delivered via a software-as-a-service (SaaS) model that’s built and hosted in Microsoft Azure. All services use core Azure services, including compute, storage, networking, SQL database, and identity and access management services.
- Accessibility standards
- WCAG 2.1 AA or EN 301 549
- Accessibility testing
- UiPath integrates accessibility into design, develop and quality assurance processes of its dependent products. Compliance to accessibility standards are evaluated through the use of automated testing, manual validation with assistive technologies, and support form third party source.
- API
- Yes
- What users can and can't do using the API
- From the integration perspective, for automation, Cloud Platform (SaaS) or Cloud Deployment can integrate with applications via the APIs. Orchestrator’s REST API fully programmatically supports all operations on the server-side like adding robots, processes, assets, queues and starting/ stopping/ scheduling processes. This is the standard way to integrate with external BPM or workflow tools, ERP, CRM or any other applications. Orchestrator REST API is powerful enough to integrate seamlessly with partner BPM systems or any other applications, providing 22 Custom API methods for access and control of 29 logical resources within Orchestrator (for example, Jobs, Logs, Queues, Robots and Settings). As an example of how users can use this, an external application such as a chatbot can easily trigger the robots to perform a task based on input in the chatbot. Refer here for more information on the APIs: https://orchestrator.uipath.com/reference
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- No
Scaling
- Independence of resources
- UiPath Cloud Platform has been designed to be ready for growth, with excess capacity planned according to the expected expansion of customers. As UiPath scale the cloud up and ensures it keeps its customer promises, we are re-actively monitoring the capacity based on engineering feedback. UiPath engineering team has worked on some of the world’s largest cloud platforms and understands the nuances of scaling cloud environments successfully and with high reliability.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Customers can view the availability of the services and incidents that have occurred using the portal: http://status.uipath.com
Monitoring of usage and performance (response time, number of transactions, etc) is limited to UiPath's Site reliability engineers' access and this is performed to ensure continuous improvement of our service. - Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- UiPath
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Other
- Other data at rest protection approach
- Each Customer is issued their own vault that stores certificates, keys, and any other credentials working between services. Additionally, all user accounts and application accounts are tied to a customer identity that serves as a separate domain. All database storage leverages AES CBC 256 or 128 where 256 is not available. Logical separation is created by means of encryption and separate accounts between services for each customer.
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- All data is accessible to customers via the UI of the Cloud Platform. In case customer wants to export data, the request for data export must be placed with UiPath who will perform the database export.
- Data export formats
- Other
- Data import formats
- Other
- Other data import formats
-
- Data cannot be imported but created in the Cloud Platform.
- Manual steps for migration from on-prem to cloud-platform are available.
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- UiPath will make commercially reasonable efforts to provide to Customer an uptime of 99.5%. Uptime is measured per service per region. The availability of the hosted service will be communicated to the Customer on the https://status.uipath.com/ webpage or through other channels, as appropriate. SLAs are specified in the user agreement.
- Approach to resilience
- The UiPath Cloud platform leverages Azure resiliency natively for all components. Currently replication is only between datacenters in the geographic region (within the US or within the EU). This could be expanded based on customer requirements. Refer here for more information: https://azure.microsoft.com/en-in/features/resiliency/
- Outage reporting
- The availability of the hosted service and any incidents/outages will be communicated to the Customer on the https://status.uipath.com/ webpage. In the status.uipath.com portal, customers can sign up for notifications and alerts via their preferred communication method: email, text, ATOM, or RSS feed.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Other
- Other user authentication
- Bulk Provisioning of users is available via integration into common Identity providers such as Azure AD, LinkedIn, and Google. UiPath’s cloud platform allows for Single Sign On from a customer’s existing cloud identity platform including Azure Active Directory and Google Suite. Customers that leverage additional services such as Okta for example, are able to leverage an Azure Active Directory Tenant that supports SAML v2 federation to Okta to provide single sign on to the UiPath cloud platform. If the identity provider integrated (such as Google) requires two-factor authentication, the same applies when user logs in to the UiPath Cloud Platform.
- Access restrictions in management interfaces and support channels
- UiPath maintains strict control over who has access to our production environment and customer data. UiPath has a team of Site Reliability Engineers (SREs) who will monitor and manage the production environment 24x365. The SREs will require access to the production environment only in cases of maintenance and support. UiPath support operates on the principle of least privilege and has no access to the environment unless first approved by the customer. Access to production service is provided on a "just in time" basis and revoked as soon as the situation is resolved. Access requests and approvals are tracked.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Username or password
- Other
- Description of management access authentication
- We maintain strict control over who has access to our production environment and customer data. UiPath has a team of Site Reliability Engineers (SREs) who will monitor and manage production environment 24x365. The SREs will require access to the production environment only in cases of maintenance and support. UiPath support operates on the principle of least privilege and has no access to the environment unless first approved by the customer. Access to production service is provided on a "just in time" basis and revoked as soon as the situation is resolved. Access requests and approvals are tracked.
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- ISO 27001 granted by Schellman & Company.
- ISO/IEC 27001 accreditation date
- Accreditation issued March 20, 2020.
- What the ISO/IEC 27001 doesn’t cover
- The certification covers our Studio, Studio X, Robot, Agent Desktop, Orchestrator, Activity Packs and Insights with regards to our core platform. With our cloud offering, it covers our Cloud Portal, Cloud Services (Document Understanding, Computer Vision, Licensing, Orchestrator) and our Automation Hub Platform.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
-
- Veracode continuous for our Cloud Platform:
- In-progress- SOC 2 Type 2, SOC 2 Type 1
- ISO 9001
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
UiPath has an internal Cyber Security Policy that defines the cyber security procedures and measures implemented by UiPath and subsidiaries in order to protect the confidentiality, integrity and availability of the company’s information assets in accordance with business objectives and applicable laws and regulations. UiPath’s Cyber Security governance framework is based on the following principles:
1. Ensuring security of UiPath critical information and systems is a shared responsibility.
2. The Global Cyber Security Policy is approved by UiPath management, published and communicated to all users (employees, contractors, freelancers, vendors and collaborators).
3. The policy will be subject to continuous monitoring and regular improvement and will be reviewed annually and modified if significant changes occur.
4. All data stored and processed by UiPath will be handled according to an appropriate level of confidentiality and in compliance with relevant regulatory and contractual requirements.
5. Cyber security roles and responsibilities will be defined and communicated.
This policy along with other subsequent policies are provided as training to all employees. Violation of policies lead to disciplinary action, upto termination of employment.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
For configuration changes to the service, for the regular maintenance of the cloud platform, which may happen every two weeks, updates are done in Deployment rings, and notification to customers are provided via the portal: https://status.uipath.com/ . Major updates are also announced in release notes.
For infrastructure changes, UiPath Cloud Platform is hosted in the Azure Data Centers. A change in storage location or infrastructure would be treated as an infrastructure incident triggering notification of the customer. UiPath has a dedicated team to work with Microsoft and the Azure team who would be notified immediately of any proposed change. - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- For external vulnerability testing, UiPath uses the services of Veracode VAPT. UiPath Robots, UiPath Studio, and our on-premise (standalone) Orchestrator are Veracode Continuous Certified. For the Cloud Platform, we have Veracode certification, ISO 27001, and working towards SOC 2 report. We also monitor vulnerabilities introduced in our code base through third-party libraries and minimize our dependency on these libraries and corresponding exposure. We also participate in the HackerOne Bounty Program to identify vulnerabilities in our RPA Platform and surrounding ecosystem. UiPath Cloud Services use Azure's PaaS which automatically provides regular updates for known security vulnerabilities in infrastructure.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
UiPath employs a 24/7 Site Reliability Team that monitors security alerts and incidents. UiPath monitors access management, application, system, and network traffic both at the perimeter and within the environment to prevent any malicious activity and to track availability and performance.
In the event of a breach, we use security response plans to minimize data leakage, loss, or corruption. We provide transparency to our customers throughout the incident (https://status.uipath.com). Once the issue is contained, our security incident management process continues as we identify the root cause and track the necessary changes to ensure we prevent similar issues in the future. - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
UiPath employs a 24/7 Site Reliability Team that monitors security alerts and incidents. UiPath monitors access management, application, system, and network traffic both at the perimeter and within the environment to prevent any malicious activity and to track availability and performance.
In the event of a breach, we use security response plans to minimize data leakage, loss, or corruption. We provide transparency to our customers throughout the incident (https://status.uipath.com). Once the issue is contained, our security incident management process continues as we identify the root cause and track the necessary changes to ensure we prevent similar issues in the future.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Covid-19 recovery
-
Covid-19 recovery
RPA can be programmed, executed and managed remotely allowing people to work from home and keep the infection levels low. while the business is able to automate tasks remotely 24/7. - Wellbeing
-
Wellbeing
RPA allows people to be more connected at work, by removing the mundane and repetitive tasks you reduce task-related frustration and empower employees to focus on more collaborative and value-creating tasks.
Pricing
- Price
- £880 a licence a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- 30 day free trial