Process and Task Mining - UiPath
Our certified Consultants deliver best in class Automation Solutions using AI (Artificial Intelligence), Low-Code BPM (Business Process Management) , Process/Task Mining, OCR (Optical Character Recognition), ODM (Operational Decision Management) and Virtual Assistants/Chatbots. We are partnered with market leading companies such as ABBYY, AutomationHero, Bizagi, Camunda, Celonis, IBM, Soroco and UiPath.
Features
- Process Mining speeds up process discovery using accurate data results
- Process Mining works in the background while employees work
- Process Mining can grade/rank process best to worst
- Once software is implemented it, bot development is faster
- Get accurate insight on time used and money saved
- Task Mining runs a ml model to accurately get data
- Use task mining to automate individual task with accuracy
- Measure your success using Task Mining
- Steps recorded by Task mining can be exported to PDD's
- process & task mining is complimentary when combined for discovery
Benefits
- Process are ranked from most beneficial to least
- Reduce costs and resources for process discovery
- Reduce multi-hops by less inefficiencies in processes and increase productivity
- Increase transparency with factual data/insights to help business operations
- Pinpoint and understand where your inefficiencies are
- Task mining analyses individual tasks with AI for detailed data
- Low touch and high scale
- Get end to end automation built of task mining outcomes
- Build an enterprise level pipeline with task mining
- Get data on end-to-end process and data for individual tasks
Pricing
£820 a user a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
2 9 3 8 4 7 9 3 4 2 8 0 2 9 1
Contact
Agile Business Process UK, LIMITED
Mark O'Connor
Telephone: +447464152100
Email: mark.oconnor@abpconsultancy.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- RPA can be used as an add on after using the process/task mining tool.
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- Planned Maintenance and regular updates to the Cloud Platform are updated in the portal, http://status.uipath.com/. For support exclusions, refer to the 'Support Exclusion' clause in the Support Terms available here: https://www.uipath.com/hubfs/legalspot/UiPath_Support_Terms.pdf
- System requirements
-
- Need an automation cloud account
- Chosen business area to record to an allocated SME
- Firewall allowed listing
- Task mining software installed
- Process mining software installed
- Setup a network shared folder (optional)
- Security review
User support
- Email or online ticketing support
- Yes, at extra cost
- Support response times
- Our standard support response times range from 1 to 8 hours depending on the incident categorisation and prioritisation as defined in a tailored service level agreement (SLA) per service. The tailored SLA also defines the agreed hours of support service available which can range from 24x7 to weekdays between 09:00 to 17:00 GMT.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- No
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- We have 3 support levels 1. 40 hours of support - £3,600 per quarter 2. 80 hours of support - £7,200 per quarter 3. Managed service - 1 FTE per quarter - £12,000 per quarter. We can provide both a technical account manager and a cloud support engineer.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
A strong differentiator for UiPath is the Learning Culture. It is critical for UiPath to make significant global investments in our people, partners, customers, industry and academia. UiPath has a free E-Learning platform (academy.uipath.com), that speeds up the learning and proficiency curve. Training for development, management and reporting consists of three levels: starting with the Foundation course, followed by the Orchestrator and then the Advanced courses. These courses are available online, free of charge and are self-led through the UiPath Academy.
Advanced courses can also be delivered as classroom training through our UiPath Official Training Partners (https://www.uipath.com/partners/official-training-partners) or in some cases, directly provided by UiPath. UiPath has 18 training partners, covering all regions. Role-based training is available and the training can be customized for the customer.
UiPath provide online resources including documentation, videos, knowledge base, and FAQs, available here: https://www.uipath.com/developers/guides-and-resources - Service documentation
- Yes
- Documentation formats
- HTML
- End-of-contract data extraction
-
From a GDPR standpoint, UiPath is considered a data processor. As such, we honor all obligations of a data processor by providing customers with full control over their data, in accordance with the product architecture and implementation.
We have ensured that we can export all of your data for you upon request. Should you close your account with UiPath Cloud Platform, or otherwise request data deletion, we delete that data from our systems after the requisite 30-day soft-delete period.
We recommend our customers assess if their use of our Cloud Platform is in line with their privacy obligations. For more information about UiPath’s privacy statement, how UiPath processes your data when using online services, and GDPR commitments, please visit our Privacy Policy: https://www.uipath.com/legal/privacy-policy - End-of-contract process
- End of contract process will be provided in user agreements. At a high level, on contract termination, all data will be exported to customer on request as per GDPR guidelines. The UiPath cloud platform follows the same guidelines as Microsoft Azure, the underlying storage platform for data destruction on contract termination. These are available at https://docs.microsoft.com/en-us/azure/security/fundamentals/protection-customer-data
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Application to install
- Yes
- Compatible operating systems
- Windows
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- The service interface is accessed via a browser and shows you insights on each process on what is most beneficial to automate.
- Accessibility standards
- WCAG 2.1 AA or EN 301 549
- Accessibility testing
- UiPath integrates accessibility into design, develop and quality assurance processes of its dependent products. Compliance to accessibility standards are evaluated through the use of automated testing, manual validation with assistive technologies, and support form third party source.
- API
- Yes
- What users can and can't do using the API
- https://docs.uipath.com/orchestrator/reference/api-references
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- No
Scaling
- Independence of resources
- UiPath Cloud Platform has been designed to be ready for growth, with excess capacity planned according to the expected expansion of customers. As we scale the cloud up and ensure it keeps it customer promises, we are re-actively monitoring the capacity based on engineering feedback. Our engineering team has worked on some of the world’s largest cloud platforms and understand the nuances of scaling cloud environments successfully and with high reliability.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Customers can view the availability of the services and incidents that have occurred using the portal: http://status.uipath.com
Monitoring of usage and performance (response time, number of transactions, etc) is limited to UiPath's Site reliability engineers' access and this is performed to ensure continuous improvement of our service. - Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- UiPath
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Other
- Other data at rest protection approach
- Each Customer is issued their own vault that stores certificates, keys, and any other credentials working between services. Additionally, all user accounts and application accounts are tied to a customer identity that serves as a separate domain. All database storage leverages AES CBC 256 or 128 where 256 is not available. Logical separation is created by means of encryption and separate accounts between services for each customer.
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- All data is accessible to customers via the UI of the Cloud Platform. In case customer wants to export data, the request for data export must be placed with UiPath who will perform the database export.
- Data export formats
- Other
- Data import formats
- Other
- Other data import formats
-
- Data cannot be imported but created in the Cloud Platform.
- Manual steps for migration from on-prem to cloud-platform are available.
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- UiPath will make commercially reasonable efforts to provide to Customer an uptime of 99.5%. Uptime is measured per service per region. The availability of the hosted service will be communicated to the Customer on the https://status.uipath.com/ webpage or through other channels, as appropriate. SLAs are specified in the user agreement.
- Approach to resilience
- The UiPath Cloud platform leverages Azure resiliency natively for all components. Currently replication is only between datacenters in the geographic region (within the US or within the EU). This could be expanded based on customer requirements. Refer here for more information: https://azure.microsoft.com/en-in/features/resiliency/
- Outage reporting
- The availability of the hosted service and any incidents/outages will be communicated to the Customer on the https://status.uipath.com/ webpage. In the status.uipath.com portal, customers can sign up for notifications and alerts via their preferred communication method: email, text, ATOM, or RSS feed.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Other
- Other user authentication
- Bulk Provisioning of users is available via integration into common Identity providers such as Azure AD, LinkedIn, and Google. UiPath’s cloud platform allows for Single Sign On from a customer’s existing cloud identity platform including Azure Active Directory and Google Suite. Customers that leverage additional services such as Okta for example, are able to leverage an Azure Active Directory Tenant that supports SAML v2 federation to Okta to provide single sign on to the UiPath cloud platform. If the identity provider integrated (such as Google) requires two-factor authentication, the same applies when user logs in to the UiPath Cloud Platform.
- Access restrictions in management interfaces and support channels
- We maintain strict control over who has access to our production environment and customer data. UiPath has a team of Site Reliability Engineers (SREs) who will monitor and manage production environment 24x365. The SREs will require access to the production environment only in cases of maintenance and support. UiPath support operates on the principle of least privilege and has no access to the environment unless first approved by the customer. Access to production service is provided on a "just in time" basis and revoked as soon as the situation is resolved. Access requests and approvals are tracked.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Username or password
- Other
- Description of management access authentication
- All UiPath employees are required to use VPN approved by the organization.Access is granted on least privilege basis and only after proper justifications are provided and verified. If a team member needs access to resolve an urgent issue or deploy a configuration change, they must apply for "just in time" access to the production service. Access is revoked as soon as the situation is resolved. Access requests and approvals are tracked. We use two-factor authentication for all production system access.
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- ISO 27001 granted by Schellman & Company.
- ISO/IEC 27001 accreditation date
- Accreditation issued March 20, 2020.
- What the ISO/IEC 27001 doesn’t cover
- The certification covers our Studio, Studio X, Robot, Agent Desktop, Orchestrator, Activity Packs and Insights with regards to our core platform. With our cloud offering, it covers our Cloud Portal, Cloud Services (Document Understanding, Computer Vision, Licensing, Orchestrator) and our Automation Hub Platform.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
-
- Veracode continuous for our Cloud Platform: https://veracode.com/verified/directory/uipath
- In-progress- SOC 2 Type 2, SOC 2 Type 1
- ISO 9001
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
UiPath has an internal Cyber Security Policy that defines the cyber security procedures and measures implemented by UiPath and subsidiaries in order to protect the confidentiality, integrity and availability of the company’s information assets in accordance with business objectives and applicable laws and regulations. UiPath’s Cyber Security governance framework is based on the following principles:
1. Ensuring security of UiPath critical information and systems is a shared responsibility.
2. The Global Cyber Security Policy is approved by UiPath management, published and communicated to all users (employees, contractors, freelancers, vendors and collaborators).
3. The policy will be subject to continuous monitoring and regular improvement and will be reviewed annually and modified if significant changes occur.
4. All data stored and processed by UiPath will be handled according to an appropriate level of confidentiality and in compliance with relevant regulatory and contractual requirements.
5. Cyber security roles and responsibilities will be defined and communicated.
This policy along with other subsequent policies are provided as training to all employees. Violation of policies lead to disciplinary action, upto termination of employment.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
For configuration changes to the service, for the regular maintenance of the cloud platform, which may happen every two weeks, updates are done in Deployment rings, and notification to customers are provided via the portal: https://status.uipath.com/ . Major updates are also announced in release notes.
For infrastructure changes, UiPath Cloud Platform is hosted in the Azure Data Centers. A change in storage location or infrastructure would be treated as an infrastructure incident triggering notification of the customer. UiPath has a dedicated team to work with Microsoft and the Azure team who would be notified immediately of any proposed change. - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- For external vulnerability testing, UiPath uses the services of Veracode VAPT. UiPath Robots, UiPath Studio, and our on-premise (standalone) Orchestrator are Veracode Continuous Certified. For the Cloud Platform, we have Veracode certification, ISO 27001, and working towards SOC 2 report. We also monitor vulnerabilities introduced in our code base through third-party libraries and minimize our dependency on these libraries and corresponding exposure. We also participate in the HackerOne Bounty Program to identify vulnerabilities in our RPA Platform and surrounding ecosystem. UiPath Cloud Services use Azure's PaaS which automatically provides regular updates for known security vulnerabilities in infrastructure.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
UiPath employs a 24/7 Site Reliability Team that monitors security alerts and incidents. UiPath monitors access management, application, system, and network traffic both at the perimeter and within the environment to prevent any malicious activity and to track availability and performance.
In the event of a breach, we use security response plans to minimize data leakage, loss, or corruption. We provide transparency to our customers throughout the incident (https://status.uipath.com). Once the issue is contained, our security incident management process continues as we identify the root cause and track the necessary changes to ensure we prevent similar issues in the future. - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Customers can raise a ticket through our online ticketing portal or use phone-in support based on the support model purchased. In the event of a breach, we use security response plans to minimize data leakage, loss, or corruption. Our 24x7 SRE and Security team identify the issue and engage the development team resources to contain the impact of the incident. Once the team has contained an issue, our security incident management process continues as we identify the root cause and track the changes to ensure we prevent similar issues in the future.Incident management for the infrastructure is managed by Azure.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Fighting climate change
-
Fighting climate change
Process and task mining tools offer valuable insights, gathered through data capture, of the daily processes' and tasks carried out by employees. In the past, this data and knowledge would have gathered through documented conversations with SME's. Remote solution yields greater insight without needing to travel to meet SME's and physically documenting conversations, thus reducing associated travel emissions and paper trail
Pricing
- Price
- £820 a user a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- 30 day Free Trial