Skip to main content

Help us improve the Digital Marketplace - send your feedback

EIDIKO SYSTEMS INTEGRATORS PVT LTD

EzFlow Intelligent Platform

EZFlow By EPSoft: Intelligent Automation Platform.Improve the success rate with a deep dive analysis that uncovers all the potential in your current business processes. Get a realistic view of how your workflows currently exist, exposing bottlenecks and other inefficiencies where improvements can be made that will deliver a clear ROI.

Features

  • Automated Process Discovery
  • Process Performance Insights & Recommendations
  • Low-code & No-code RPA Tools
  • Third-party RPA Integrations & Orchestration
  • Customized Persona-based Views
  • Supports Best-of-Breed Modeling Notations
  • Enhanced With OCR, NLG, NLP & Other AI
  • Comprehensive Change Impact Analysis

Benefits

  • Improved Efficiency and Productivity
  • Enhanced Decision-Making
  • Risk Mitigation and Compliance
  • Automation and Digital Transformation
  • Operational Transparency and Insight
  • Cost Reduction
  • Flexibility and Scalability
  • Accessibility
  • Continuous Improvement

Pricing

£650 to £1,350 a unit

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at vijay.tatineni@eidiko.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

2 2 9 7 0 1 7 5 6 1 7 6 2 9 1

Contact

EIDIKO SYSTEMS INTEGRATORS PVT LTD Vijay Tatineni
Telephone: 07507548569
Email: vijay.tatineni@eidiko.com

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
The service can be integrated with the existing RPA or BPM solutions
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints
No constraints as such and the product can be customised as required
System requirements
Modern Web Browser

User support

Email or online ticketing support
Yes, at extra cost
Support response times
Same Day
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
9 to 5 (UK time), 7 days a week
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Standard Support as below
Technical Support: Access to a help desk for resolving technical issues, usually available during standard business hours. This often includes troubleshooting and assistance with software bugs.
Software Updates: Regular updates that include bug fixes, security patches, and minor feature enhancements.

Premium Support as below
Extended Technical Support: Offering 24/7 support services to handle critical issues anytime.
Dedicated Account Manager: A dedicated point of contact for all support-related queries and strategic advice.
Faster Response Times: Guaranteed faster response times for troubleshooting and resolving issues.

Enhanced Support as below
Proactive Monitoring: Continuous monitoring of the platform to detect and resolve issues before they affect business operations.
Custom Consultations: Access to experts for advice on best practices and optimization of the platform for specific business needs.
Training and Education: Regularly scheduled training sessions and access to comprehensive learning resources to ensure users are proficient in using the platform.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Training
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
Using the API's and Data Export Tools
End-of-contract process
Data Extraction and Migration

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
No
Designed for use on mobile devices
No
Service interface
No
User support accessibility
None or don’t know
API
Yes
What users can and can't do using the API
API Key Registration and following the provided documentation
API documentation
Yes
API documentation formats
  • Open API (also known as Swagger)
  • PDF
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
The look and feel, Automation services

Scaling

Independence of resources
Scalability and performance monitoring

Analytics

Service usage metrics
Yes
Metrics types
Performance Metrics Efficiency Metrics Quality Metrics Business Impact Metrics Scalability and Adaptability Metrics Usage Metrics Customer Experience Metrics
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller providing extra support
Organisation whose services are being resold
EPSoft, IBM

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least every 6 months
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Using the Data Export Tools
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
99% Availability
Approach to resilience
Available on request
Outage reporting
Email Alerts and an API

Identity and authentication

User authentication needed
Yes
User authentication
2-factor authentication
Access restrictions in management interfaces and support channels
Role-Based Access Controls
Access restriction testing frequency
At least every 6 months
Management access authentication
2-factor authentication

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
ISO/IEC 27001 Standard
GDPR Compliance
Employee Training and Awareness

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
We have a systematic and controlled approaches to handling updates, modifications, and the deployment of new features within the system.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Identification, Evaluation and Prioritization
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
We establish a baseline and continuous monitoring along with alerting and investigation
Incident management type
Supplier-defined controls
Incident management approach
Incident Identification: Detect and recording of an incident.
Incident Logging: Every identified incident is logged and documented
Incident Categorization: Once logged, each incident is categorized according to its nature and type.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

Equal opportunity

Equal opportunity

The Company is committed to providing a working environment in which employees are able to realise their full potential and to contribute to the success of the business. Our aim is to identify and eliminate discriminatory practices and behaviours throughout the organisation. Employees are expected to support this commitment and to assist in its realisation in all possible ways.Specifically, the Company aims to ensure that no employee or job applicant is discriminated against, either directly or indirectly, by perception or association, or by harassment, on the grounds of age, race or nationality, disability, religion or similar philosophical belief, sexual orientation or gender. All employees, whether part time or full time, permanent or temporary, will be treated fairly and with respect. All employees will be helped and encouraged to develop their full potential so that their talents and resources may be fully utilised to maximise the efficiency of the organisation. This commitment applies to all aspects of employment, including those outlined below: • Recruitment and selection • Training • Promotion and career development opportunities • Terms and conditions of employment, and access to employment related benefits and facilities • Grievance handling and the application of disciplinary procedures • Selection for redundancy The company management and all members of staff have a shared responsibility to ensure that the Equal Opportunities Policy is adhered to and to promote dignity and equality of opportunity at work. Breaches of the Equal Opportunities Policy by staff members will be regarded as potential misconduct and could lead to disciplinary proceedings.

Pricing

Price
£650 to £1,350 a unit
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
For POC and learning purposes

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at vijay.tatineni@eidiko.com. Tell them what format you need. It will help if you say what assistive technology you use.