UiPath Communications Mining
UiPath Communications Mining is an RPA and AI service that extracts valuable insights from communications data. It uses NLP to understand context and sentiment, automates manual tasks, and integrates with other UiPath solutions. Scalable and customizable, it supports various communication channels and provides actionable insights for better decision-making.
Features
- Advanced NLP/ML algorithms: Improved data analysis and understanding.
- Automated extraction: Increased efficiency and accuracy.
- Structured data transformation: Enhanced data analysis capabilities.
- UiPath product integration: End-to-end automation workflows.
- Multi-cloud support: Flexible deployment options.
- Pre-built integrations: Seamless connectivity with cloud services.
- Customizable extraction rules: Tailored to specific business needs.
- Real-time monitoring: Timely insights and reporting.
- Scalable architecture: Handles large volumes of data.
- Secure data processing: Ensures data privacy and security.
Benefits
- Improves operational efficiency, reducing costs.
- Provides actionable insights for informed decision-making.
- Scalable to handle growing volumes of communications data.
- Customizable to meet unique business needs and requirements.
- Secure and compliant, protecting sensitive data.
- Real-time analytics for quick identification of trends.
- Integrates with other systems for customized automation.
- Improves customer service through data-driven insights.
- Gains competitive advantage through advanced analytics.
- Reduces risk through automated data analysis and reporting.
Pricing
£15,000 a licence
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
2 9 1 4 9 7 5 1 7 0 7 0 5 4 3
Contact
EXTRA TECHNOLOGY LIMITED
Paul Donoghue-Parker
Telephone: 07739340099
Email: paul.donoghue-parker@extratechnology.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- Communications Mining can be integrated with other software services, including other UiPath products such as UiPath Studio and UiPath Orchestrator, to create end-to-end automation workflows. It can also be integrated with popular cloud services such as Salesforce, ServiceNow, and Zendesk.
- Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
- UiPath Communications Mining has some constraints that buyers should be aware of. For example, the tool may not be able to extract information from certain types of unstructured data, such as handwritten documents or images. Additionally, the accuracy of the extracted information may vary depending on the quality and complexity of the data. It is important for buyers to carefully evaluate their specific use case and data requirements before implementing UiPath Communications Mining.
- System requirements
-
- Operating System: Windows, Linux, or macOS.
- Processor: Intel or AMD processor.
- Memory: Minimum of 4GB RAM.
- Disk Space: Minimum of 2GB free disk space.
- Network: Internet connection required for activation and updates.
- Browser: Google Chrome, Mozilla Firefox, or Microsoft Edge.
- Java: Java Runtime Environment (JRE) 8 or later.
- Python: Python 3.6 or later.
- UiPath Studio: UiPath Studio 2019.10 or later.
- UiPath Orchestrator: UiPath Orchestrator 2019.10 or later.
User support
- Email or online ticketing support
- Yes, at extra cost
- Support response times
-
Product Support Level 1 and 2 provided by the reseller.
Bot development support from Extra Technology is also available on request but there are additional costs associated. - User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Yes, at an extra cost
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- WCAG 2.1 AAA
- Web chat accessibility testing
- N/A
- Onsite support
- Yes, at extra cost
- Support levels
-
Both inclusive and paid support models available. For paid model, costs vary based on licensing and support level required.
Extra Technology can also provide bespoke managed service support at a cost. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Ensuring a smooth start in terms of product installation and customer relationship is crucial. Our team will ensure the product is successfully installed and working correctly. We have extensive technical knowledge and are known as industry experts. In addition, as one of UiPath's high level resale and consultancy partners, We have direct access to the technical support and product teams, as well as excellent C-level relationships. We also have our own support team that provide product and bot development support.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- When a user's contract with UiPath Communications Mining ends, they can extract their data using various methods, depending on their specific use case and requirements. For example, users can export their data in CSV or JSON format, or use the API to extract their data programmatically.
- End-of-contract process
-
End of Contract:
At the end of the contract period, several scenarios may unfold:
Renewal - If both parties are satisfied, the contract can be renewed for another term.
Termination - The contract may terminate due to completion, dissatisfaction, or other reasons.
Transition - If the project continues, there might be a transition phase to ensure a smooth handover.
Included in the Price:
Software Licenses - The UiPath software licenses are typically part of the base price.
Standard Support - Basic support services, including bug fixes and updates.
Training Materials - Access to training resources and documentation.
Initial Implementation - Setting up UiPath tools and configuring processes.
Additional Costs:
Customization - Tailoring UiPath solutions to specific business needs.
Advanced Support - Premium support tiers with faster response times.
Consulting Services - Expert guidance for complex projects.
Add-On Modules - Extra features beyond the standard package.
Cloud Infrastructure - Costs related to hosting on UiPath Cloud.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Application to install
- Yes
- Compatible operating systems
-
- Linux or Unix
- MacOS
- Windows
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- UiPath Communications Mining is not designed to be used on mobile devices, and there are no specific differences between the mobile and desktop service. However, as mentioned earlier, the user experience on mobile devices may not be optimal, and some features may not be available or fully functional. It is recommended to use UiPath Communications Mining on desktop or laptop computers for optimal performance and functionality.
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- Description of service interface
- UiPath Communications Mining has a web-based interface that allows users to configure and manage communication mining processes. The interface provides various features and functionalities, including data source configuration, extraction rule creation, model training, and reporting. The interface can be accessed via a web browser, and requires authentication and authorization to ensure secure access to the service.
- Accessibility standards
- WCAG 2.1 AA or EN 301 549
- Accessibility testing
- N/A
- API
- Yes
- What users can and can't do using the API
-
UiPath Communications Mining provides an API that allows developers to integrate the service with other applications and systems. Through the API, users can perform various tasks, including:
- Setting up communication mining processes, such as configuring data sources and extraction rules.
- Extracting and analyzing unstructured data from various sources, such as emails, chats, and documents.
- Managing communication mining processes, such as starting, stopping, and monitoring processes.
- Retrieving and analyzing communication mining results and insights. - API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- UiPath Communications Mining provides various customization options to meet the specific needs and requirements of buyers. For example, buyers can customize the extraction rules and models used to extract and analyze unstructured data, as well as configure the service to integrate with other applications and systems. Additionally, UiPath provides professional services and support resources to help buyers customize and optimize their communication mining processes.
Scaling
- Independence of resources
- UiPath Communications Mining is designed to handle high volumes of data and processing demands, and provides various mechanisms to ensure that users are not affected by the demand placed on the service by other users. For example, UiPath uses load balancing and auto-scaling technologies to distribute processing demands across multiple servers and instances, ensuring that users are not impacted by the overall demand on the service. Additionally, UiPath provides various SLAs and resources to help users monitor and optimize their communication mining processes, and ensure that they are not affected by the demand placed on the service by other users.
Analytics
- Service usage metrics
- Yes
- Metrics types
- UiPath Communications Mining provides various service usage metrics to help users monitor and optimize their communication mining processes. For example, users can view metrics such as the number of documents processed, extraction accuracy, and processing time, as well as generate reports and dashboards to visualize their data and insights.
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- UiPath
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- UiPath Communications Mining provides various methods for users to export their data, depending on their specific use case and requirements. For example, users can export their data in CSV or JSON format, or use the API to extract their data programmatically.
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- XML
- JSON
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- HTML
- XML
- JSON
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- Other
- Other protection between networks
- UiPath Communications Mining uses industry-standard encryption protocols such as TLS (Version 1.2 or above) to secure data in transit between the buyer's network and UiPath's network. Additionally, UiPath provides various authentication and authorization mechanisms to ensure that only authorized users can access the service, and provides various compliance certifications and attestations, such as ISO 27001 and SOC 2, to demonstrate its commitment to data security and privacy. UiPath also provides various network security features, such as firewalls and intrusion detection/prevention systems, to protect against unauthorized access and attacks.
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- Other
- Other protection within supplier network
- UiPath Communications Mining uses industry-standard encryption protocols such as TLS (Version 1.2 or above) to secure data within UiPath's network. Additionally, UiPath provides various network security features, such as firewalls and intrusion detection/prevention systems, to protect against unauthorized access and attacks. UiPath also provides various authentication and authorization mechanisms to ensure that only authorized users can access the service, and provides various compliance certifications and attestations, such as ISO 27001 and SOC 2, to demonstrate its commitment to data security and privacy.
Availability and resilience
- Guaranteed availability
-
UiPath's SLA availability is 99.9%
UiPath Communications Mining provides various service level agreements (SLAs) for availability, depending on the specific use case and requirements of the user. For example, UiPath provides SLAs for uptime, response time, and data availability, as well as various mechanisms for monitoring and reporting on service availability. If UiPath fails to meet the guaranteed levels of availability, users may be eligible for refunds or credits, depending on the specific terms and conditions of their contract. Additionally, UiPath provides various security and compliance features to ensure that data is handled securely and in accordance with relevant regulations and standards. - Approach to resilience
- UiPath Communications Mining is designed to be resilient through various mechanisms, such as redundancy and failover mechanisms, to ensure that the service remains available and functional in the event of an outage or disaster. For example, UiPath provides various backup and disaster recovery mechanisms, as well as load balancing and failover mechanisms, to ensure that the service remains available and functional in the event of an outage or disaster. Additionally, UiPath provides various security and compliance features to ensure that data is handled securely and in accordance with relevant regulations and standards.
- Outage reporting
- UiPath Communications Mining provides various mechanisms for reporting outages and service disruptions, depending on the specific use case and requirements of the user. For example, UiPath provides a public dashboard for monitoring service availability and performance, as well as various APIs and email alerts for reporting outages and service disruptions. Additionally, UiPath provides various security and compliance features to ensure that data is handled securely and in accordance with relevant regulations and standards.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- UiPath Communications Mining restricts access to management interfaces and support channels by implementing various access controls, such as role-based access control (RBAC), least privilege, and separation of duties. UiPath follows industry best practices and standards for access control, such as the National Institute of Standards and Technology (NIST) Cybersecurity Framework and the Open Web Application Security Project (OWASP) guidelines. Additionally, UiPath has various compliance certifications and attestations, such as ISO 27001 and SOC 2 TypeII. UiPath also has a process in place for managing access controls and ensuring that only authorized personnel have access to management interfaces and support channels.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- ISO 27001 granted by Schellman & Company.
- ISO/IEC 27001 accreditation date
- Accreditation issued March 20, 2020
- What the ISO/IEC 27001 doesn’t cover
-
The certification covers our Studio, Studio X, Robot, Agent Desktop,
Orchestrator, Activity Packs and Insights with regards to our core
platform. With our cloud offering, it covers our Cloud Portal, Cloud
Services (Document Understanding, Computer Vision, Licensing,
Orchestrator) and our Automation Hub Platform. - ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
-
- Veracode continuous for our Cloud Platform: https://veracode.com/verified/directory/uipath
- SOC 2 Type 2, SOC 2 Type 1
- ISO 27001
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- CSA CCM version 3.0
- ISO/IEC 27001
- Other
- Other security governance standards
- UiPath has various ISO 27001 certifications, as well as SOC 2 Type II. Additionally, the National Institute of Standards and Technology (NIST) Cybersecurity Framework and the Open Web Application Security Project (OWASP) guidelines. UiPath complies with Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM) version 3.0.
- Information security policies and processes
-
UiPath Communications Mining follows various information security policies and processes to ensure the security and compliance of its services. For example, UiPath has various policies and procedures for access control, incident management, risk management, and business continuity planning. Additionally, UiPath follows industry best practices and standards for information security, such as the National Institute of Standards and Technology (NIST) Cybersecurity Framework and the Open Web Application Security Project (OWASP) guidelines. UiPath also has various compliance certifications and attestations, such as ISO 27001 and SOC 2 Type II, to demonstrate its commitment to information security.
UiPath has a reporting structure in place to ensure that information security policies and processes are followed. For example, UiPath has a Chief Information Security Officer (CISO) who is responsible for overseeing the information security program and ensuring that policies and procedures are followed. Additionally, UiPath has various mechanisms for monitoring and reporting on information security, such as regular audits and assessments, as well as various security and compliance features to ensure that data is handled securely and in accordance with relevant regulations and standards.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- UiPath Communications Mining tracks the components of its services through their lifetime using version control systems and configuration management databases. Changes are assessed for potential security impact using change management processes and risk assessments. UiPath follows industry best practices and standards, such as NIST and OWASP, and has compliance certifications like ISO 27001 and SOC 2 Type II. UiPath also conforms to recognized standards like CSA CCM v3.0 and SSAE-16 / ISAE 3402.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- UiPath Communications Mining assesses potential threats to its services using various mechanisms, such as threat intelligence feeds and vulnerability scanning tools. UiPath deploys patches quickly using automated patch management processes. UiPath gets its information about potential threats from various sources, such as security advisories and vulnerability databases. UiPath follows industry best practices and standards, such as NIST and OWASP, and has compliance certifications like ISO 27001 and SOC 2 Type II. UiPath also conforms to recognized standards like CSA CCM v3.0 and SSAE-16 / ISAE 3402.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- UiPath Communications Mining identifies potential compromises using various mechanisms, such as intrusion detection and prevention systems and security information and event management (SIEM) tools. UiPath responds to potential compromises by following its incident response plan, which includes containment, eradication, and recovery steps. UiPath responds quickly to incidents using its incident response team and automated incident response processes. UiPath follows industry best practices and standards, such as NIST and OWASP, and has compliance certifications like ISO 27001 and SOC 2 Type II. UiPath also conforms to recognized standards like CSA CCM v3.0 and SSAE-16 / ISAE 3402.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- UiPath Communications Mining has pre-defined processes for common events, such as security incidents and service outages. Users can report incidents through various channels, such as email, phone, or a web-based ticketing system. UiPath provides incident reports to users through various channels, such as email or a web-based portal. UiPath follows industry best practices and standards, such as NIST and OWASP, and has compliance certifications like ISO 27001 and SOC 2 Type II. UiPath also conforms to recognized standards like CSA CCM v3.0 and SSAE-16 / ISAE 3402.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Covid-19 recoveryCovid-19 recovery
The use of automation software solutions can help 'support organisations and businesses to manage and recover from the impacts of COVID-19'. It can do this by allowing businesses to leverage automation to make cost savings, increase productivity, reduce errors, decrease time to market and enable the business to do more with the some amount of resources. It can also help staff morale, taking mundane, repetitive tasks away from humans and allowing them to focus on more interesting and fulfilling areas.
Pricing
- Price
- £15,000 a licence
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- This 60-day trial provides access to UiPath Studio and StudioX for designing and developing automations, as well as an Attended Robot to assist with everyday tasks. This trial does not include any other UiPath products.