Agile Business Process UK, LIMITED

Process and Task Mining - UiPath

Our certified Consultants deliver best in class Automation Solutions using AI (Artificial Intelligence), Low-Code BPM (Business Process Management) , Process/Task Mining, OCR (Optical Character Recognition), ODM (Operational Decision Management) and Virtual Assistants/Chatbots. We are partnered with market leading companies such as ABBYY, AutomationHero, Bizagi, Camunda, Celonis, IBM, Soroco and UiPath.

Features

  • Process Mining speeds up process discovery using accurate data results
  • Process Mining works in the background while employees work
  • Process Mining can grade/rank process best to worst
  • Once software is implemented it, bot development is faster
  • Get accurate insight on time used and money saved
  • Task Mining runs a ml model to accurately get data
  • Use task mining to automate individual task with accuracy
  • Measure your success using Task Mining
  • Steps recorded by Task mining can be exported to PDD's
  • process & task mining is complimentary when combined for discovery

Benefits

  • Process are ranked from most beneficial to least
  • Reduce costs and resources for process discovery
  • Reduce multi-hops by less inefficiencies in processes and increase productivity
  • Increase transparency with factual data/insights to help business operations
  • Pinpoint and understand where your inefficiencies are
  • Task mining analyses individual tasks with AI for detailed data
  • Low touch and high scale
  • Get end to end automation built of task mining outcomes
  • Build an enterprise level pipeline with task mining
  • Get data on end-to-end process and data for individual tasks

Pricing

£820 a user a year

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at mark.oconnor@abpconsultancy.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 13

Service ID

2 9 3 8 4 7 9 3 4 2 8 0 2 9 1

Contact

Agile Business Process UK, LIMITED Mark O'Connor
Telephone: +447464152100
Email: mark.oconnor@abpconsultancy.com

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
RPA can be used as an add on after using the process/task mining tool.
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints
Planned Maintenance and regular updates to the Cloud Platform are updated in the portal, http://status.uipath.com/. For support exclusions, refer to the 'Support Exclusion' clause in the Support Terms available here: https://www.uipath.com/hubfs/legalspot/UiPath_Support_Terms.pdf
System requirements
  • Need an automation cloud account
  • Chosen business area to record to an allocated SME
  • Firewall allowed listing
  • Task mining software installed
  • Process mining software installed
  • Setup a network shared folder (optional)
  • Security review

User support

Email or online ticketing support
Yes, at extra cost
Support response times
Our standard support response times range from 1 to 8 hours depending on the incident categorisation and prioritisation as defined in a tailored service level agreement (SLA) per service. The tailored SLA also defines the agreed hours of support service available which can range from 24x7 to weekdays between 09:00 to 17:00 GMT.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
No
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
We have 3 support levels 1. 40 hours of support - £3,600 per quarter 2. 80 hours of support - £7,200 per quarter 3. Managed service - 1 FTE per quarter - £12,000 per quarter. We can provide both a technical account manager and a cloud support engineer.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
A strong differentiator for UiPath is the Learning Culture. It is critical for UiPath to make significant global investments in our people, partners, customers, industry and academia. UiPath has a free E-Learning platform (academy.uipath.com), that speeds up the learning and proficiency curve. Training for development, management and reporting consists of three levels: starting with the Foundation course, followed by the Orchestrator and then the Advanced courses. These courses are available online, free of charge and are self-led through the UiPath Academy.

Advanced courses can also be delivered as classroom training through our UiPath Official Training Partners (https://www.uipath.com/partners/official-training-partners) or in some cases, directly provided by UiPath. UiPath has 18 training partners, covering all regions. Role-based training is available and the training can be customized for the customer.

UiPath provide online resources including documentation, videos, knowledge base, and FAQs, available here: https://www.uipath.com/developers/guides-and-resources
Service documentation
Yes
Documentation formats
HTML
End-of-contract data extraction
From a GDPR standpoint, UiPath is considered a data processor. As such, we honor all obligations of a data processor by providing customers with full control over their data, in accordance with the product architecture and implementation.
We have ensured that we can export all of your data for you upon request. Should you close your account with UiPath Cloud Platform, or otherwise request data deletion, we delete that data from our systems after the requisite 30-day soft-delete period.
We recommend our customers assess if their use of our Cloud Platform is in line with their privacy obligations. For more information about UiPath’s privacy statement, how UiPath processes your data when using online services, and GDPR commitments, please visit our Privacy Policy: https://www.uipath.com/legal/privacy-policy
End-of-contract process
End of contract process will be provided in user agreements. At a high level, on contract termination, all data will be exported to customer on request as per GDPR guidelines. The UiPath cloud platform follows the same guidelines as Microsoft Azure, the underlying storage platform for data destruction on contract termination. These are available at https://docs.microsoft.com/en-us/azure/security/fundamentals/protection-customer-data

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
Application to install
Yes
Compatible operating systems
Windows
Designed for use on mobile devices
No
Service interface
Yes
User support accessibility
None or don’t know
Description of service interface
The service interface is accessed via a browser and shows you insights on each process on what is most beneficial to automate.
Accessibility standards
WCAG 2.1 AA or EN 301 549
Accessibility testing
UiPath integrates accessibility into design, develop and quality assurance processes of its dependent products. Compliance to accessibility standards are evaluated through the use of automated testing, manual validation with assistive technologies, and support form third party source.
API
Yes
What users can and can't do using the API
https://docs.uipath.com/orchestrator/reference/api-references
API documentation
Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
API sandbox or test environment
Yes
Customisation available
No

Scaling

Independence of resources
UiPath Cloud Platform has been designed to be ready for growth, with excess capacity planned according to the expected expansion of customers. As we scale the cloud up and ensure it keeps it customer promises, we are re-actively monitoring the capacity based on engineering feedback. Our engineering team has worked on some of the world’s largest cloud platforms and understand the nuances of scaling cloud environments successfully and with high reliability.

Analytics

Service usage metrics
Yes
Metrics types
Customers can view the availability of the services and incidents that have occurred using the portal: http://status.uipath.com

Monitoring of usage and performance (response time, number of transactions, etc) is limited to UiPath's Site reliability engineers' access and this is performed to ensure continuous improvement of our service.
Reporting types
Real-time dashboards

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
UiPath

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Other
Other data at rest protection approach
Each Customer is issued their own vault that stores certificates, keys, and any other credentials working between services. Additionally, all user accounts and application accounts are tied to a customer identity that serves as a separate domain. All database storage leverages AES CBC 256 or 128 where 256 is not available. Logical separation is created by means of encryption and separate accounts between services for each customer.
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
All data is accessible to customers via the UI of the Cloud Platform. In case customer wants to export data, the request for data export must be placed with UiPath who will perform the database export.
Data export formats
Other
Data import formats
Other
Other data import formats
  • Data cannot be imported but created in the Cloud Platform.
  • Manual steps for migration from on-prem to cloud-platform are available.

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
UiPath will make commercially reasonable efforts to provide to Customer an uptime of 99.5%. Uptime is measured per service per region. The availability of the hosted service will be communicated to the Customer on the https://status.uipath.com/ webpage or through other channels, as appropriate. SLAs are specified in the user agreement.
Approach to resilience
The UiPath Cloud platform leverages Azure resiliency natively for all components. Currently replication is only between datacenters in the geographic region (within the US or within the EU). This could be expanded based on customer requirements. Refer here for more information: https://azure.microsoft.com/en-in/features/resiliency/
Outage reporting
The availability of the hosted service and any incidents/outages will be communicated to the Customer on the https://status.uipath.com/ webpage. In the status.uipath.com portal, customers can sign up for notifications and alerts via their preferred communication method: email, text, ATOM, or RSS feed.

Identity and authentication

User authentication needed
Yes
User authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
  • Other
Other user authentication
Bulk Provisioning of users is available via integration into common Identity providers such as Azure AD, LinkedIn, and Google. UiPath’s cloud platform allows for Single Sign On from a customer’s existing cloud identity platform including Azure Active Directory and Google Suite. Customers that leverage additional services such as Okta for example, are able to leverage an Azure Active Directory Tenant that supports SAML v2 federation to Okta to provide single sign on to the UiPath cloud platform. If the identity provider integrated (such as Google) requires two-factor authentication, the same applies when user logs in to the UiPath Cloud Platform.
Access restrictions in management interfaces and support channels
We maintain strict control over who has access to our production environment and customer data. UiPath has a team of Site Reliability Engineers (SREs) who will monitor and manage production environment 24x365. The SREs will require access to the production environment only in cases of maintenance and support. UiPath support operates on the principle of least privilege and has no access to the environment unless first approved by the customer. Access to production service is provided on a "just in time" basis and revoked as soon as the situation is resolved. Access requests and approvals are tracked.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password
  • Other
Description of management access authentication
All UiPath employees are required to use VPN approved by the organization.Access is granted on least privilege basis and only after proper justifications are provided and verified. If a team member needs access to resolve an urgent issue or deploy a configuration change, they must apply for "just in time" access to the production service. Access is revoked as soon as the situation is resolved. Access requests and approvals are tracked. We use two-factor authentication for all production system access.

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
ISO 27001 granted by Schellman & Company.
ISO/IEC 27001 accreditation date
Accreditation issued March 20, 2020.
What the ISO/IEC 27001 doesn’t cover
The certification covers our Studio, Studio X, Robot, Agent Desktop, Orchestrator, Activity Packs and Insights with regards to our core platform. With our cloud offering, it covers our Cloud Portal, Cloud Services (Document Understanding, Computer Vision, Licensing, Orchestrator) and our Automation Hub Platform.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
Yes
Any other security certifications
  • Veracode continuous for our Cloud Platform: https://veracode.com/verified/directory/uipath
  • In-progress- SOC 2 Type 2, SOC 2 Type 1
  • ISO 9001

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
UiPath has an internal Cyber Security Policy that defines the cyber security procedures and measures implemented by UiPath and subsidiaries in order to protect the confidentiality, integrity and availability of the company’s information assets in accordance with business objectives and applicable laws and regulations. UiPath’s Cyber Security governance framework is based on the following principles:
1. Ensuring security of UiPath critical information and systems is a shared responsibility.
2. The Global Cyber Security Policy is approved by UiPath management, published and communicated to all users (employees, contractors, freelancers, vendors and collaborators).
3. The policy will be subject to continuous monitoring and regular improvement and will be reviewed annually and modified if significant changes occur.
4. All data stored and processed by UiPath will be handled according to an appropriate level of confidentiality and in compliance with relevant regulatory and contractual requirements.
5. Cyber security roles and responsibilities will be defined and communicated.

This policy along with other subsequent policies are provided as training to all employees. Violation of policies lead to disciplinary action, upto termination of employment.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
For configuration changes to the service, for the regular maintenance of the cloud platform, which may happen every two weeks, updates are done in Deployment rings, and notification to customers are provided via the portal: https://status.uipath.com/ . Major updates are also announced in release notes.
For infrastructure changes, UiPath Cloud Platform is hosted in the Azure Data Centers. A change in storage location or infrastructure would be treated as an infrastructure incident triggering notification of the customer. UiPath has a dedicated team to work with Microsoft and the Azure team who would be notified immediately of any proposed change.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
For external vulnerability testing, UiPath uses the services of Veracode VAPT. UiPath Robots, UiPath Studio, and our on-premise (standalone) Orchestrator are Veracode Continuous Certified. For the Cloud Platform, we have Veracode certification, ISO 27001, and working towards SOC 2 report. We also monitor vulnerabilities introduced in our code base through third-party libraries and minimize our dependency on these libraries and corresponding exposure. We also participate in the HackerOne Bounty Program to identify vulnerabilities in our RPA Platform and surrounding ecosystem. UiPath Cloud Services use Azure's PaaS which automatically provides regular updates for known security vulnerabilities in infrastructure.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
UiPath employs a 24/7 Site Reliability Team that monitors security alerts and incidents. UiPath monitors access management, application, system, and network traffic both at the perimeter and within the environment to prevent any malicious activity and to track availability and performance.
In the event of a breach, we use security response plans to minimize data leakage, loss, or corruption. We provide transparency to our customers throughout the incident (https://status.uipath.com). Once the issue is contained, our security incident management process continues as we identify the root cause and track the necessary changes to ensure we prevent similar issues in the future.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Customers can raise a ticket through our online ticketing portal or use phone-in support based on the support model purchased. In the event of a breach, we use security response plans to minimize data leakage, loss, or corruption. Our 24x7 SRE and Security team identify the issue and engage the development team resources to contain the impact of the incident. Once the team has contained an issue, our security incident management process continues as we identify the root cause and track the changes to ensure we prevent similar issues in the future.Incident management for the infrastructure is managed by Azure.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Fighting climate change

Fighting climate change

Process and task mining tools offer valuable insights, gathered through data capture, of the daily processes' and tasks carried out by employees. In the past, this data and knowledge would have gathered through documented conversations with SME's. Remote solution yields greater insight without needing to travel to meet SME's and physically documenting conversations, thus reducing associated travel emissions and paper trail

Pricing

Price
£820 a user a year
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
30 day Free Trial

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at mark.oconnor@abpconsultancy.com. Tell them what format you need. It will help if you say what assistive technology you use.