Blue Prism
We resell Blue Prism's intelligent automation platform which provides RPA and intelligent automations. Highly intuitive and reliable, it is suitable for business users and managers through to technical RPA developers, it allows the robotisation of repetitive and logical processes. Available as a SaaS (Blue Prism Cloud) or self hosted (Enterprize)
Features
- Drag and drop easily create Bots (Automated Processes)
- Local or Web Interface: intuitive user experience on devices
- Orchestrator - Centralized control for managing robotic process automation workflows.
- Blue Prism Robot component to execute automations on machines
- Pluggable architecture provides even greater flexibility and extensibility
- Add Python, VBScript, and JavaScript to create more sophisticated bots.
- Create intelligent bots by combining with ML, NLP and more.
- Single step through debugging, version control.
- Extensive library (VBO's) of pre-built automation components.
- Digital Exchange for additional capability and applications
Benefits
- One stop solution for front-end, back-end and cognitive
- Has features and product suite to encapsulate all RPA requirements
- Achieve Automation Benefits in weeks
- Suitable for Developers, Citizen Users, IT Users etc.
- Application Agnostic, various deployment options
- Boosts productivity by freeing up time from manual tasks
- Delivers rapid return on investment (ROI) with quick implementation
- Extensive security features
- Streamlines operations for increased efficiency
- nhances accuracy and reduces errors in business processes.
Pricing
£15,000 a licence
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
2 5 6 5 6 5 4 6 9 4 8 1 0 7 2
Contact
EXTRA TECHNOLOGY LIMITED
Paul Donoghue-Parker
Telephone: 07739340099
Email: paul.donoghue-parker@extratechnology.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- Blue Prism can be an extension to any Windows, local software or web-based application. It automates business processes that are conducted within one or many of these systems. For certain applications, such as Microsoft Excel, Salesforce and ServiceNow, there are specific integrations that makes it an extension of those platforms.
- Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
-
Blue Prims bots can only be run on a Windows (W10
(1709) and later and Server 2016 and later) machine, therefore the platform can only automate applications that are supported by that operating system. - System requirements
-
- See System requirements for each component
- https://bpdocs.blueprism.com/en-us/supported-software.htm
User support
- Email or online ticketing support
- Yes, at extra cost
- Support response times
-
Product Support provided by vendor
Production Maintenance and Support
Business-Critical Maintenance and Support is ideal for business-critical process automations and need 24x7 live support for high-priority issues
Support provided by us
Bot development support is also available on request but there are additional costs associated. - User can manage status and priority of support tickets
- No
- Phone support
- No
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Both inclusive and paid support models available. For paid model, costs vary based on licensing and support level required.
We can also provide bespoke managed service support at a cost. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Ensuring a smooth start in terms of product installation and customer relationship is crucial. Our team will ensure the product is successfully installed and working correctly. We have extensive technical knowledge and are known as industry experts. In addition, as one of Blue Prism's high level resale and consultancy partners, We have direct access to the technical support and product teams, as well as excellent C-level relationships. We also have our own support team that provide product and bot development support.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
-
Bot files, audit logs and insight dashboards.
Everything can be exported as either XML, CSV or PDF's. - End-of-contract process
-
End of Contract:
At the end of the contract period, several scenarios may unfold:
Renewal - If both parties are satisfied, the contract can be renewed for another term.
Termination - The contract may terminate due to completion, dissatisfaction, or other reasons.
Transition - If the project continues, there might be a transition phase to ensure a smooth handover.
Included in the Price:
Software Licenses - The core Blue Prism software licenses are typically part of the base price.
Standard Support - Basic support services, including bug fixes and updates.
Training Materials - Access to training resources and documentation.
Initial Implementation - Setting up Blue Prism tools and configuring processes.
Additional Costs:
Customization - Tailoring solutions to specific business needs.
Advanced Support - Premium support tiers with faster response times.
Consulting Services - Expert guidance for complex projects.
Add-On Modules - Extra features beyond the standard package.
Additional add-ons and applications available on Digital Exchange
Cloud Infrastructure - Costs related to hosting on Cloud.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Application to install
- Yes
- Compatible operating systems
-
- Linux or Unix
- Windows
- Other
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- WCAG 2.1 AAA
- API
- Yes
- What users can and can't do using the API
-
Blue Prism caters for SOAP and Rest API's to interact with external applications
Internally Blue Prism API surfaces monitoring data for sessions, work queues, and schedule information, enabling schedule management control. The API establishes a connection between Hub Control Room and Blue Prism, and requires Authentication Server to be set up in Blue Prism Hub. - API documentation
- Yes
- API documentation formats
- Open API (also known as Swagger)
- API sandbox or test environment
- Yes
- Customisation available
- No
Scaling
- Independence of resources
- Each User has its own individual Tenant which is their own private environment and each tenant's performance will not be affected by another.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Built-in interactive dashboards provide key metrics on active users having access to control room, register client systems, past bot failures, total digital workforce, their schedules and work queues.
Dashboards that provide operational analytics and details, The Status of Bots, upcoming workloads and Top Failure reasons.
View and analyse Device's (Runtime bot machine) relevant data when Bots are deployed on those Devices. Eg: Bots that failed to execute on devices for a given time - Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Blue Prism
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
- Other
- Other data at rest protection approach
-
Blue Prism only uses recognized encryption standards and includes Federal Information Processing Standard (FIPS)- compliant options. The end user can choose the algorithm, generate the encryption keys, and dictate where the key is stored. Tools exist within the Blue Prism product to facilitate the
rotation of encryption keys.
• Blue Prism Application Server (recommended): The encryption key is stored on the
Application Server. It ensures the
key is stored separately from the encrypted data
• Database: The encryption key is stored in the Blue Prism database. By default, this information is encrypted symmetrically using
AES Encryption. - Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Bot files, audit logs and insight dashboards. Everything can be exported as either XML, CSV or PDF's.
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- XML
- XAML
- JSON
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- Word
- Database
- HTML
- JSON
- Images
- Excel
Data-in-transit protection
- Data protection between buyer and supplier networks
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- Other
- Other protection within supplier network
-
Blue Prism recommends that certificate-based encryption
is applied by manually deploying a certificate to each Runtime Resource and start-up parameters
TCP connections:
Is built upon the .NET Framework version 4.7. The .NET Framework 4.7 and later
versions default to the host operating system configuration, automatically choosing the best
security protocol and version. This applies to TCP-, WCF- and HTTP-based communication.
Available protocols and ciphers are managed by the end user or are automatically handled
through Microsoft security updates.
The WCF connection used in Blue Prism:
• Message encryption and Windows authentication
• Transport encryption and Windows authentication
• Transport encryption
Availability and resilience
- Guaranteed availability
- SLA availability is 99.9%
- Approach to resilience
- Available on request
- Outage reporting
- Email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Other
- Other user authentication
-
ACT I V E D I R E CTO R Y I N T E G RAT I O N
Using the .Net System.Security and SystemDirectoryServices namespaces, Blue Prism provides
a range of enterprise-strength capabilities by leveraging Active Directory (AD) Domain
Services. Active Directory is used to manage and control user access to the Blue Prism platform
in-line with existing security policies, which is the recommended approach for enterprise
deployments. Furthermore, Active Directory can be used to provide inter-component message
security - Access restrictions in management interfaces and support channels
-
Role-Based Access Control: Blue Prism access is role-based and configured independently (Logical Access Model (LAM)) for each environment, allowing specific users to have different access dependent on the environment.
Encryption: Data transmitted between users and management interfaces or support channels is encrypted to prevent unauthorized access or interception. - Access restriction testing frequency
- At least once a year
- Management access authentication
- Other
- Description of management access authentication
-
ACT I V E D I R E CTO R Y I N T E G RAT I O N
Using the .Net System.Security and SystemDirectoryServices namespaces, Blue Prism provides
a range of enterprise-strength capabilities by leveraging Active Directory (AD) Domain
Services. Active Directory is used to manage and control user access to the Blue Prism platform
in-line with existing security policies, which is the recommended approach for enterprise
deployments. Furthermore, Active Directory can be used to provide inter-component message
security
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
-
Scanning policy includes checks from the following security standards:
• NIST
• OWASP Top 10
• SANS Top 25
• PCI
• HIPAA
• FISMA
• STIG - Information security policies and processes
-
DATA AT REST Blue Prism only uses recognized encryption standards and includes Federal Information Processing Standard (FIPS)-compliant options. The end user can choose the algorithm, generate the encryption keys,
and dictate where the key is stored. Tools exist within the Blue Prism product to facilitate the
rotation of encryption keys.
DATA IN USE
Blue Prism uses Microsoft’s Secure String functionality that is built into the .Net framework.
A secure string represents text that should be kept confidential, such as by deleting it from
computer memory when no longer needed. Blue Prism Safe String is a wrapper around Secure
String, which is built into the .NET Framework. It ensures that when sensitive information,
such as a password, is being processed in memory, it is held in a secure container that
cannot be compromised — even if an attacker was able to inspect a memory snapshot of the
application at that time no sensitive information would be exposed..
DATA I N M OT I O N
Blue Prism recommends that certificate-based encryption
is applied by manually deploying an appropriate certificate to each Runtime Resource and
updating the device’s start-up parameters
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Configuration uses Dev, QA and Prod Environments. Blue Prism ROM practise and standards are used for Chand Management
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
Monitoring Software
Daily
Monitoring Sotware - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
Monitoring software
Corrective action based on severity
Response is based on severity - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
Incidents are logged via ticketing system
All communication is managed by ticketing system
Incidents are classified based on severity P1, P2,P3 and P4
Reports generated by ticketing system
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Covid-19 recoveryCovid-19 recovery
The use of automation software solutions can help 'support organisations and businesses to manage and recover from the impacts of COVID-19'. It can do this by allowing businesses to leverage automation to make cost savings, increase productivity, reduce errors, decrease time to market and enable the business to do more with the some amount of resources. It can also help staff morale, taking mundane, repetitive tasks away from humans and allowing them to focus on more interesting and fulfilling areas.
Pricing
- Price
- £15,000 a licence
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- https://www.blueprism.com/free-trial/