Skip to main content

Help us improve the Digital Marketplace - send your feedback

EXTRA TECHNOLOGY LIMITED

Blue Prism

We resell Blue Prism's intelligent automation platform which provides RPA and intelligent automations. Highly intuitive and reliable, it is suitable for business users and managers through to technical RPA developers, it allows the robotisation of repetitive and logical processes. Available as a SaaS (Blue Prism Cloud) or self hosted (Enterprize)

Features

  • Drag and drop easily create Bots (Automated Processes)
  • Local or Web Interface: intuitive user experience on devices
  • Orchestrator - Centralized control for managing robotic process automation workflows.
  • Blue Prism Robot component to execute automations on machines
  • Pluggable architecture provides even greater flexibility and extensibility
  • Add Python, VBScript, and JavaScript to create more sophisticated bots.
  • Create intelligent bots by combining with ML, NLP and more.
  • Single step through debugging, version control.
  • Extensive library (VBO's) of pre-built automation components.
  • Digital Exchange for additional capability and applications

Benefits

  • One stop solution for front-end, back-end and cognitive
  • Has features and product suite to encapsulate all RPA requirements
  • Achieve Automation Benefits in weeks
  • Suitable for Developers, Citizen Users, IT Users etc.
  • Application Agnostic, various deployment options
  • Boosts productivity by freeing up time from manual tasks
  • Delivers rapid return on investment (ROI) with quick implementation
  • Extensive security features
  • Streamlines operations for increased efficiency
  • nhances accuracy and reduces errors in business processes.

Pricing

£15,000 a licence

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at paul.donoghue-parker@extratechnology.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

2 5 6 5 6 5 4 6 9 4 8 1 0 7 2

Contact

EXTRA TECHNOLOGY LIMITED Paul Donoghue-Parker
Telephone: 07739340099
Email: paul.donoghue-parker@extratechnology.com

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Blue Prism can be an extension to any Windows, local software or web-based application. It automates business processes that are conducted within one or many of these systems. For certain applications, such as Microsoft Excel, Salesforce and ServiceNow, there are specific integrations that makes it an extension of those platforms.
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints
Blue Prims bots can only be run on a Windows (W10
(1709) and later and Server 2016 and later) machine, therefore the platform can only automate applications that are supported by that operating system.
System requirements
  • See System requirements for each component
  • https://bpdocs.blueprism.com/en-us/supported-software.htm

User support

Email or online ticketing support
Yes, at extra cost
Support response times
Product Support provided by vendor
Production Maintenance and Support
Business-Critical Maintenance and Support is ideal for business-critical process automations and need 24x7 live support for high-priority issues

Support provided by us
Bot development support is also available on request but there are additional costs associated.
User can manage status and priority of support tickets
No
Phone support
No
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Both inclusive and paid support models available. For paid model, costs vary based on licensing and support level required.

We can also provide bespoke managed service support at a cost.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Ensuring a smooth start in terms of product installation and customer relationship is crucial. Our team will ensure the product is successfully installed and working correctly. We have extensive technical knowledge and are known as industry experts. In addition, as one of Blue Prism's high level resale and consultancy partners, We have direct access to the technical support and product teams, as well as excellent C-level relationships. We also have our own support team that provide product and bot development support.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Bot files, audit logs and insight dashboards.

Everything can be exported as either XML, CSV or PDF's.
End-of-contract process
End of Contract:
At the end of the contract period, several scenarios may unfold:
Renewal - If both parties are satisfied, the contract can be renewed for another term.
Termination - The contract may terminate due to completion, dissatisfaction, or other reasons.
Transition - If the project continues, there might be a transition phase to ensure a smooth handover.

Included in the Price:
Software Licenses - The core Blue Prism software licenses are typically part of the base price.
Standard Support - Basic support services, including bug fixes and updates.
Training Materials - Access to training resources and documentation.
Initial Implementation - Setting up Blue Prism tools and configuring processes.

Additional Costs:
Customization - Tailoring solutions to specific business needs.
Advanced Support - Premium support tiers with faster response times.
Consulting Services - Expert guidance for complex projects.
Add-On Modules - Extra features beyond the standard package.
Additional add-ons and applications available on Digital Exchange
Cloud Infrastructure - Costs related to hosting on Cloud.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
Application to install
Yes
Compatible operating systems
  • Linux or Unix
  • Windows
  • Other
Designed for use on mobile devices
No
Service interface
No
User support accessibility
WCAG 2.1 AAA
API
Yes
What users can and can't do using the API
Blue Prism caters for SOAP and Rest API's to interact with external applications

Internally Blue Prism API surfaces monitoring data for sessions, work queues, and schedule information, enabling schedule management control. The API establishes a connection between Hub Control Room and Blue Prism, and requires Authentication Server to be set up in Blue Prism Hub.
API documentation
Yes
API documentation formats
Open API (also known as Swagger)
API sandbox or test environment
Yes
Customisation available
No

Scaling

Independence of resources
Each User has its own individual Tenant which is their own private environment and each tenant's performance will not be affected by another.

Analytics

Service usage metrics
Yes
Metrics types
Built-in interactive dashboards provide key metrics on active users having access to control room, register client systems, past bot failures, total digital workforce, their schedules and work queues.

Dashboards that provide operational analytics and details, The Status of Bots, upcoming workloads and Top Failure reasons.

View and analyse Device's (Runtime bot machine) relevant data when Bots are deployed on those Devices. Eg: Bots that failed to execute on devices for a given time
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Blue Prism

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
Other
Other data at rest protection approach
Blue Prism only uses recognized encryption standards and includes Federal Information Processing Standard (FIPS)- compliant options. The end user can choose the algorithm, generate the encryption keys, and dictate where the key is stored. Tools exist within the Blue Prism product to facilitate the
rotation of encryption keys.
• Blue Prism Application Server (recommended): The encryption key is stored on the
Application Server. It ensures the
key is stored separately from the encrypted data
• Database: The encryption key is stored in the Blue Prism database. By default, this information is encrypted symmetrically using
AES Encryption.
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Bot files, audit logs and insight dashboards. Everything can be exported as either XML, CSV or PDF's.
Data export formats
  • CSV
  • Other
Other data export formats
  • XML
  • XAML
  • PDF
  • JSON
Data import formats
  • CSV
  • Other
Other data import formats
  • Word
  • Database
  • HTML
  • PDF
  • JSON
  • Images
  • Excel

Data-in-transit protection

Data protection between buyer and supplier networks
IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Other
Other protection within supplier network
Blue Prism recommends that certificate-based encryption
is applied by manually deploying a certificate to each Runtime Resource and start-up parameters

TCP connections:
Is built upon the .NET Framework version 4.7. The .NET Framework 4.7 and later
versions default to the host operating system configuration, automatically choosing the best
security protocol and version. This applies to TCP-, WCF- and HTTP-based communication.
Available protocols and ciphers are managed by the end user or are automatically handled
through Microsoft security updates.
The WCF connection used in Blue Prism:
• Message encryption and Windows authentication
• Transport encryption and Windows authentication
• Transport encryption

Availability and resilience

Guaranteed availability
SLA availability is 99.9%
Approach to resilience
Available on request
Outage reporting
Email alerts

Identity and authentication

User authentication needed
Yes
User authentication
Other
Other user authentication
ACT I V E D I R E CTO R Y I N T E G RAT I O N
Using the .Net System.Security and SystemDirectoryServices namespaces, Blue Prism provides
a range of enterprise-strength capabilities by leveraging Active Directory (AD) Domain
Services. Active Directory is used to manage and control user access to the Blue Prism platform
in-line with existing security policies, which is the recommended approach for enterprise
deployments. Furthermore, Active Directory can be used to provide inter-component message
security
Access restrictions in management interfaces and support channels
Role-Based Access Control: Blue Prism access is role-based and configured independently (Logical Access Model (LAM)) for each environment, allowing specific users to have different access dependent on the environment.

Encryption: Data transmitted between users and management interfaces or support channels is encrypted to prevent unauthorized access or interception.
Access restriction testing frequency
At least once a year
Management access authentication
Other
Description of management access authentication
ACT I V E D I R E CTO R Y I N T E G RAT I O N
Using the .Net System.Security and SystemDirectoryServices namespaces, Blue Prism provides
a range of enterprise-strength capabilities by leveraging Active Directory (AD) Domain
Services. Active Directory is used to manage and control user access to the Blue Prism platform
in-line with existing security policies, which is the recommended approach for enterprise
deployments. Furthermore, Active Directory can be used to provide inter-component message
security

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
Other
Other security governance standards
Scanning policy includes checks from the following security standards:
• NIST
• OWASP Top 10
• SANS Top 25
• PCI
• HIPAA
• FISMA
• STIG
Information security policies and processes
DATA AT REST Blue Prism only uses recognized encryption standards and includes Federal Information Processing Standard (FIPS)-compliant options. The end user can choose the algorithm, generate the encryption keys,
and dictate where the key is stored. Tools exist within the Blue Prism product to facilitate the
rotation of encryption keys.

DATA IN USE
Blue Prism uses Microsoft’s Secure String functionality that is built into the .Net framework.
A secure string represents text that should be kept confidential, such as by deleting it from
computer memory when no longer needed. Blue Prism Safe String is a wrapper around Secure
String, which is built into the .NET Framework. It ensures that when sensitive information,
such as a password, is being processed in memory, it is held in a secure container that
cannot be compromised — even if an attacker was able to inspect a memory snapshot of the
application at that time no sensitive information would be exposed..
DATA I N M OT I O N
Blue Prism recommends that certificate-based encryption
is applied by manually deploying an appropriate certificate to each Runtime Resource and
updating the device’s start-up parameters

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Configuration uses Dev, QA and Prod Environments. Blue Prism ROM practise and standards are used for Chand Management
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Monitoring Software
Daily
Monitoring Sotware
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Monitoring software
Corrective action based on severity
Response is based on severity
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Incidents are logged via ticketing system
All communication is managed by ticketing system
Incidents are classified based on severity P1, P2,P3 and P4
Reports generated by ticketing system

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

Covid-19 recovery

Covid-19 recovery

The use of automation software solutions can help 'support organisations and businesses to manage and recover from the impacts of COVID-19'. It can do this by allowing businesses to leverage automation to make cost savings, increase productivity, reduce errors, decrease time to market and enable the business to do more with the some amount of resources. It can also help staff morale, taking mundane, repetitive tasks away from humans and allowing them to focus on more interesting and fulfilling areas.

Pricing

Price
£15,000 a licence
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
https://www.blueprism.com/free-trial/

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at paul.donoghue-parker@extratechnology.com. Tell them what format you need. It will help if you say what assistive technology you use.