Skip to main content

Help us improve the Digital Marketplace - send your feedback

EXTRA TECHNOLOGY LIMITED

UiPath Communications Mining

UiPath Communications Mining is an RPA and AI service that extracts valuable insights from communications data. It uses NLP to understand context and sentiment, automates manual tasks, and integrates with other UiPath solutions. Scalable and customizable, it supports various communication channels and provides actionable insights for better decision-making.

Features

  • Advanced NLP/ML algorithms: Improved data analysis and understanding.
  • Automated extraction: Increased efficiency and accuracy.
  • Structured data transformation: Enhanced data analysis capabilities.
  • UiPath product integration: End-to-end automation workflows.
  • Multi-cloud support: Flexible deployment options.
  • Pre-built integrations: Seamless connectivity with cloud services.
  • Customizable extraction rules: Tailored to specific business needs.
  • Real-time monitoring: Timely insights and reporting.
  • Scalable architecture: Handles large volumes of data.
  • Secure data processing: Ensures data privacy and security.

Benefits

  • Improves operational efficiency, reducing costs.
  • Provides actionable insights for informed decision-making.
  • Scalable to handle growing volumes of communications data.
  • Customizable to meet unique business needs and requirements.
  • Secure and compliant, protecting sensitive data.
  • Real-time analytics for quick identification of trends.
  • Integrates with other systems for customized automation.
  • Improves customer service through data-driven insights.
  • Gains competitive advantage through advanced analytics.
  • Reduces risk through automated data analysis and reporting.

Pricing

£15,000 a licence

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at paul.donoghue-parker@extratechnology.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

2 9 1 4 9 7 5 1 7 0 7 0 5 4 3

Contact

EXTRA TECHNOLOGY LIMITED Paul Donoghue-Parker
Telephone: 07739340099
Email: paul.donoghue-parker@extratechnology.com

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Communications Mining can be integrated with other software services, including other UiPath products such as UiPath Studio and UiPath Orchestrator, to create end-to-end automation workflows. It can also be integrated with popular cloud services such as Salesforce, ServiceNow, and Zendesk.
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints
UiPath Communications Mining has some constraints that buyers should be aware of. For example, the tool may not be able to extract information from certain types of unstructured data, such as handwritten documents or images. Additionally, the accuracy of the extracted information may vary depending on the quality and complexity of the data. It is important for buyers to carefully evaluate their specific use case and data requirements before implementing UiPath Communications Mining.
System requirements
  • Operating System: Windows, Linux, or macOS.
  • Processor: Intel or AMD processor.
  • Memory: Minimum of 4GB RAM.
  • Disk Space: Minimum of 2GB free disk space.
  • Network: Internet connection required for activation and updates.
  • Browser: Google Chrome, Mozilla Firefox, or Microsoft Edge.
  • Java: Java Runtime Environment (JRE) 8 or later.
  • Python: Python 3.6 or later.
  • UiPath Studio: UiPath Studio 2019.10 or later.
  • UiPath Orchestrator: UiPath Orchestrator 2019.10 or later.

User support

Email or online ticketing support
Yes, at extra cost
Support response times
Product Support Level 1 and 2 provided by the reseller.

Bot development support from Extra Technology is also available on request but there are additional costs associated.
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
Yes, at an extra cost
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
WCAG 2.1 AAA
Web chat accessibility testing
N/A
Onsite support
Yes, at extra cost
Support levels
Both inclusive and paid support models available. For paid model, costs vary based on licensing and support level required.

Extra Technology can also provide bespoke managed service support at a cost.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Ensuring a smooth start in terms of product installation and customer relationship is crucial. Our team will ensure the product is successfully installed and working correctly. We have extensive technical knowledge and are known as industry experts. In addition, as one of UiPath's high level resale and consultancy partners, We have direct access to the technical support and product teams, as well as excellent C-level relationships. We also have our own support team that provide product and bot development support.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
When a user's contract with UiPath Communications Mining ends, they can extract their data using various methods, depending on their specific use case and requirements. For example, users can export their data in CSV or JSON format, or use the API to extract their data programmatically.
End-of-contract process
End of Contract:
At the end of the contract period, several scenarios may unfold:
Renewal - If both parties are satisfied, the contract can be renewed for another term.
Termination - The contract may terminate due to completion, dissatisfaction, or other reasons.
Transition - If the project continues, there might be a transition phase to ensure a smooth handover.

Included in the Price:
Software Licenses - The UiPath software licenses are typically part of the base price.
Standard Support - Basic support services, including bug fixes and updates.
Training Materials - Access to training resources and documentation.
Initial Implementation - Setting up UiPath tools and configuring processes.

Additional Costs:
Customization - Tailoring UiPath solutions to specific business needs.
Advanced Support - Premium support tiers with faster response times.
Consulting Services - Expert guidance for complex projects.
Add-On Modules - Extra features beyond the standard package.
Cloud Infrastructure - Costs related to hosting on UiPath Cloud.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
Application to install
Yes
Compatible operating systems
  • Linux or Unix
  • MacOS
  • Windows
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
UiPath Communications Mining is not designed to be used on mobile devices, and there are no specific differences between the mobile and desktop service. However, as mentioned earlier, the user experience on mobile devices may not be optimal, and some features may not be available or fully functional. It is recommended to use UiPath Communications Mining on desktop or laptop computers for optimal performance and functionality.
Service interface
Yes
User support accessibility
WCAG 2.1 AA or EN 301 549
Description of service interface
UiPath Communications Mining has a web-based interface that allows users to configure and manage communication mining processes. The interface provides various features and functionalities, including data source configuration, extraction rule creation, model training, and reporting. The interface can be accessed via a web browser, and requires authentication and authorization to ensure secure access to the service.
Accessibility standards
WCAG 2.1 AA or EN 301 549
Accessibility testing
N/A
API
Yes
What users can and can't do using the API
UiPath Communications Mining provides an API that allows developers to integrate the service with other applications and systems. Through the API, users can perform various tasks, including:

- Setting up communication mining processes, such as configuring data sources and extraction rules.
- Extracting and analyzing unstructured data from various sources, such as emails, chats, and documents.
- Managing communication mining processes, such as starting, stopping, and monitoring processes.
- Retrieving and analyzing communication mining results and insights.
API documentation
Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
UiPath Communications Mining provides various customization options to meet the specific needs and requirements of buyers. For example, buyers can customize the extraction rules and models used to extract and analyze unstructured data, as well as configure the service to integrate with other applications and systems. Additionally, UiPath provides professional services and support resources to help buyers customize and optimize their communication mining processes.

Scaling

Independence of resources
UiPath Communications Mining is designed to handle high volumes of data and processing demands, and provides various mechanisms to ensure that users are not affected by the demand placed on the service by other users. For example, UiPath uses load balancing and auto-scaling technologies to distribute processing demands across multiple servers and instances, ensuring that users are not impacted by the overall demand on the service. Additionally, UiPath provides various SLAs and resources to help users monitor and optimize their communication mining processes, and ensure that they are not affected by the demand placed on the service by other users.

Analytics

Service usage metrics
Yes
Metrics types
UiPath Communications Mining provides various service usage metrics to help users monitor and optimize their communication mining processes. For example, users can view metrics such as the number of documents processed, extraction accuracy, and processing time, as well as generate reports and dashboards to visualize their data and insights.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
UiPath

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
UiPath Communications Mining provides various methods for users to export their data, depending on their specific use case and requirements. For example, users can export their data in CSV or JSON format, or use the API to extract their data programmatically.
Data export formats
  • CSV
  • Other
Other data export formats
  • XML
  • PDF
  • JSON
Data import formats
  • CSV
  • Other
Other data import formats
  • HTML
  • XML
  • JSON

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Other
Other protection between networks
UiPath Communications Mining uses industry-standard encryption protocols such as TLS (Version 1.2 or above) to secure data in transit between the buyer's network and UiPath's network. Additionally, UiPath provides various authentication and authorization mechanisms to ensure that only authorized users can access the service, and provides various compliance certifications and attestations, such as ISO 27001 and SOC 2, to demonstrate its commitment to data security and privacy. UiPath also provides various network security features, such as firewalls and intrusion detection/prevention systems, to protect against unauthorized access and attacks.
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Other
Other protection within supplier network
UiPath Communications Mining uses industry-standard encryption protocols such as TLS (Version 1.2 or above) to secure data within UiPath's network. Additionally, UiPath provides various network security features, such as firewalls and intrusion detection/prevention systems, to protect against unauthorized access and attacks. UiPath also provides various authentication and authorization mechanisms to ensure that only authorized users can access the service, and provides various compliance certifications and attestations, such as ISO 27001 and SOC 2, to demonstrate its commitment to data security and privacy.

Availability and resilience

Guaranteed availability
UiPath's SLA availability is 99.9%

UiPath Communications Mining provides various service level agreements (SLAs) for availability, depending on the specific use case and requirements of the user. For example, UiPath provides SLAs for uptime, response time, and data availability, as well as various mechanisms for monitoring and reporting on service availability. If UiPath fails to meet the guaranteed levels of availability, users may be eligible for refunds or credits, depending on the specific terms and conditions of their contract. Additionally, UiPath provides various security and compliance features to ensure that data is handled securely and in accordance with relevant regulations and standards.
Approach to resilience
UiPath Communications Mining is designed to be resilient through various mechanisms, such as redundancy and failover mechanisms, to ensure that the service remains available and functional in the event of an outage or disaster. For example, UiPath provides various backup and disaster recovery mechanisms, as well as load balancing and failover mechanisms, to ensure that the service remains available and functional in the event of an outage or disaster. Additionally, UiPath provides various security and compliance features to ensure that data is handled securely and in accordance with relevant regulations and standards.
Outage reporting
UiPath Communications Mining provides various mechanisms for reporting outages and service disruptions, depending on the specific use case and requirements of the user. For example, UiPath provides a public dashboard for monitoring service availability and performance, as well as various APIs and email alerts for reporting outages and service disruptions. Additionally, UiPath provides various security and compliance features to ensure that data is handled securely and in accordance with relevant regulations and standards.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
UiPath Communications Mining restricts access to management interfaces and support channels by implementing various access controls, such as role-based access control (RBAC), least privilege, and separation of duties. UiPath follows industry best practices and standards for access control, such as the National Institute of Standards and Technology (NIST) Cybersecurity Framework and the Open Web Application Security Project (OWASP) guidelines. Additionally, UiPath has various compliance certifications and attestations, such as ISO 27001 and SOC 2 TypeII. UiPath also has a process in place for managing access controls and ensuring that only authorized personnel have access to management interfaces and support channels.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
ISO 27001 granted by Schellman & Company.
ISO/IEC 27001 accreditation date
Accreditation issued March 20, 2020
What the ISO/IEC 27001 doesn’t cover
The certification covers our Studio, Studio X, Robot, Agent Desktop,
Orchestrator, Activity Packs and Insights with regards to our core
platform. With our cloud offering, it covers our Cloud Portal, Cloud
Services (Document Understanding, Computer Vision, Licensing,
Orchestrator) and our Automation Hub Platform.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
Yes
Any other security certifications
  • Veracode continuous for our Cloud Platform: https://veracode.com/verified/directory/uipath
  • SOC 2 Type 2, SOC 2 Type 1
  • ISO 27001

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
  • CSA CCM version 3.0
  • ISO/IEC 27001
  • Other
Other security governance standards
UiPath has various ISO 27001 certifications, as well as SOC 2 Type II. Additionally, the National Institute of Standards and Technology (NIST) Cybersecurity Framework and the Open Web Application Security Project (OWASP) guidelines. UiPath complies with Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM) version 3.0.
Information security policies and processes
UiPath Communications Mining follows various information security policies and processes to ensure the security and compliance of its services. For example, UiPath has various policies and procedures for access control, incident management, risk management, and business continuity planning. Additionally, UiPath follows industry best practices and standards for information security, such as the National Institute of Standards and Technology (NIST) Cybersecurity Framework and the Open Web Application Security Project (OWASP) guidelines. UiPath also has various compliance certifications and attestations, such as ISO 27001 and SOC 2 Type II, to demonstrate its commitment to information security.

UiPath has a reporting structure in place to ensure that information security policies and processes are followed. For example, UiPath has a Chief Information Security Officer (CISO) who is responsible for overseeing the information security program and ensuring that policies and procedures are followed. Additionally, UiPath has various mechanisms for monitoring and reporting on information security, such as regular audits and assessments, as well as various security and compliance features to ensure that data is handled securely and in accordance with relevant regulations and standards.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
UiPath Communications Mining tracks the components of its services through their lifetime using version control systems and configuration management databases. Changes are assessed for potential security impact using change management processes and risk assessments. UiPath follows industry best practices and standards, such as NIST and OWASP, and has compliance certifications like ISO 27001 and SOC 2 Type II. UiPath also conforms to recognized standards like CSA CCM v3.0 and SSAE-16 / ISAE 3402.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
UiPath Communications Mining assesses potential threats to its services using various mechanisms, such as threat intelligence feeds and vulnerability scanning tools. UiPath deploys patches quickly using automated patch management processes. UiPath gets its information about potential threats from various sources, such as security advisories and vulnerability databases. UiPath follows industry best practices and standards, such as NIST and OWASP, and has compliance certifications like ISO 27001 and SOC 2 Type II. UiPath also conforms to recognized standards like CSA CCM v3.0 and SSAE-16 / ISAE 3402.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
UiPath Communications Mining identifies potential compromises using various mechanisms, such as intrusion detection and prevention systems and security information and event management (SIEM) tools. UiPath responds to potential compromises by following its incident response plan, which includes containment, eradication, and recovery steps. UiPath responds quickly to incidents using its incident response team and automated incident response processes. UiPath follows industry best practices and standards, such as NIST and OWASP, and has compliance certifications like ISO 27001 and SOC 2 Type II. UiPath also conforms to recognized standards like CSA CCM v3.0 and SSAE-16 / ISAE 3402.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
UiPath Communications Mining has pre-defined processes for common events, such as security incidents and service outages. Users can report incidents through various channels, such as email, phone, or a web-based ticketing system. UiPath provides incident reports to users through various channels, such as email or a web-based portal. UiPath follows industry best practices and standards, such as NIST and OWASP, and has compliance certifications like ISO 27001 and SOC 2 Type II. UiPath also conforms to recognized standards like CSA CCM v3.0 and SSAE-16 / ISAE 3402.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

Covid-19 recovery

Covid-19 recovery

The use of automation software solutions can help 'support organisations and businesses to manage and recover from the impacts of COVID-19'. It can do this by allowing businesses to leverage automation to make cost savings, increase productivity, reduce errors, decrease time to market and enable the business to do more with the some amount of resources. It can also help staff morale, taking mundane, repetitive tasks away from humans and allowing them to focus on more interesting and fulfilling areas.

Pricing

Price
£15,000 a licence
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
This 60-day trial provides access to UiPath Studio and StudioX for designing and developing automations, as well as an Attended Robot to assist with everyday tasks. This trial does not include any other UiPath products.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at paul.donoghue-parker@extratechnology.com. Tell them what format you need. It will help if you say what assistive technology you use.