EzFlow Intelligent Platform
EZFlow By EPSoft: Intelligent Automation Platform.Improve the success rate with a deep dive analysis that uncovers all the potential in your current business processes. Get a realistic view of how your workflows currently exist, exposing bottlenecks and other inefficiencies where improvements can be made that will deliver a clear ROI.
Features
- Automated Process Discovery
- Process Performance Insights & Recommendations
- Low-code & No-code RPA Tools
- Third-party RPA Integrations & Orchestration
- Customized Persona-based Views
- Supports Best-of-Breed Modeling Notations
- Enhanced With OCR, NLG, NLP & Other AI
- Comprehensive Change Impact Analysis
Benefits
- Improved Efficiency and Productivity
- Enhanced Decision-Making
- Risk Mitigation and Compliance
- Automation and Digital Transformation
- Operational Transparency and Insight
- Cost Reduction
- Flexibility and Scalability
- Accessibility
- Continuous Improvement
Pricing
£650 to £1,350 a unit
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
2 2 9 7 0 1 7 5 6 1 7 6 2 9 1
Contact
EIDIKO SYSTEMS INTEGRATORS PVT LTD
Vijay Tatineni
Telephone: 07507548569
Email: vijay.tatineni@eidiko.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- The service can be integrated with the existing RPA or BPM solutions
- Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
- No constraints as such and the product can be customised as required
- System requirements
- Modern Web Browser
User support
- Email or online ticketing support
- Yes, at extra cost
- Support response times
- Same Day
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Standard Support as below
Technical Support: Access to a help desk for resolving technical issues, usually available during standard business hours. This often includes troubleshooting and assistance with software bugs.
Software Updates: Regular updates that include bug fixes, security patches, and minor feature enhancements.
Premium Support as below
Extended Technical Support: Offering 24/7 support services to handle critical issues anytime.
Dedicated Account Manager: A dedicated point of contact for all support-related queries and strategic advice.
Faster Response Times: Guaranteed faster response times for troubleshooting and resolving issues.
Enhanced Support as below
Proactive Monitoring: Continuous monitoring of the platform to detect and resolve issues before they affect business operations.
Custom Consultations: Access to experts for advice on best practices and optimization of the platform for specific business needs.
Training and Education: Regularly scheduled training sessions and access to comprehensive learning resources to ensure users are proficient in using the platform. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Training
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- Using the API's and Data Export Tools
- End-of-contract process
- Data Extraction and Migration
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
- API Key Registration and following the provided documentation
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- The look and feel, Automation services
Scaling
- Independence of resources
- Scalability and performance monitoring
Analytics
- Service usage metrics
- Yes
- Metrics types
- Performance Metrics Efficiency Metrics Quality Metrics Business Impact Metrics Scalability and Adaptability Metrics Usage Metrics Customer Experience Metrics
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra support
- Organisation whose services are being resold
- EPSoft, IBM
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Using the Data Export Tools
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- 99% Availability
- Approach to resilience
- Available on request
- Outage reporting
- Email Alerts and an API
Identity and authentication
- User authentication needed
- Yes
- User authentication
- 2-factor authentication
- Access restrictions in management interfaces and support channels
- Role-Based Access Controls
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
- 2-factor authentication
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
ISO/IEC 27001 Standard
GDPR Compliance
Employee Training and Awareness
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- We have a systematic and controlled approaches to handling updates, modifications, and the deployment of new features within the system.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Identification, Evaluation and Prioritization
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- We establish a baseline and continuous monitoring along with alerting and investigation
- Incident management type
- Supplier-defined controls
- Incident management approach
-
Incident Identification: Detect and recording of an incident.
Incident Logging: Every identified incident is logged and documented
Incident Categorization: Once logged, each incident is categorized according to its nature and type.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Equal opportunityEqual opportunity
The Company is committed to providing a working environment in which employees are able to realise their full potential and to contribute to the success of the business. Our aim is to identify and eliminate discriminatory practices and behaviours throughout the organisation. Employees are expected to support this commitment and to assist in its realisation in all possible ways.Specifically, the Company aims to ensure that no employee or job applicant is discriminated against, either directly or indirectly, by perception or association, or by harassment, on the grounds of age, race or nationality, disability, religion or similar philosophical belief, sexual orientation or gender. All employees, whether part time or full time, permanent or temporary, will be treated fairly and with respect. All employees will be helped and encouraged to develop their full potential so that their talents and resources may be fully utilised to maximise the efficiency of the organisation. This commitment applies to all aspects of employment, including those outlined below: • Recruitment and selection • Training • Promotion and career development opportunities • Terms and conditions of employment, and access to employment related benefits and facilities • Grievance handling and the application of disciplinary procedures • Selection for redundancy The company management and all members of staff have a shared responsibility to ensure that the Equal Opportunities Policy is adhered to and to promote dignity and equality of opportunity at work. Breaches of the Equal Opportunities Policy by staff members will be regarded as potential misconduct and could lead to disciplinary proceedings.
Pricing
- Price
- £650 to £1,350 a unit
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- For POC and learning purposes