Rapid Process Mining - powered by Celonis
By harnessing the process mining power of Celonis, Rapid ERP will provide fast time to value insights into how your organisation executes its business processes. We will target the process inefficiencies and deviations which are causing the biggest impact to your Business, highlighting improvement opportunities and how to action them.
Features
- Introduction to the best-in-class Celonis process mining technology
- Fast PoV insights of business processes with pre-built apps
- Executive dashboarding based on strategic business objectives and KPIs
- Real time process discovery and deep dive analysis
- Automated root cause and business impact analysis
- Process conformance and adherence monitoring
- Automated analysis of rework and automation levels
- Internal and external best-in-class industry benchmarking
- Business value, cost saving, ROI (Return on Investment) calculation tools
- Target driven improvement planning with automated progress tracking
Benefits
- Highly scalable and flexible delivery approach
- Gain 100% transparency into core business processes
- Pinpoint the process inefficiencies which impact the Business most
- Reduce non-compliant or fraudulent process activity
- Measure process automation potential and how to realise it
- Be empowered to make fact-based, data-driven decisions
- Lower process costs and increase ROI (Return on Investment)
- Reduce manual rework and increase productivity
- Improve customer satisfaction and NPS (Net Promoter Score)
- Preparation for digital transformation
Pricing
£30,000.00 a unit
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
3 8 0 7 7 2 1 4 0 9 9 8 9 3 3
Contact
Rapid ERP
New Business Team
Telephone: +447740193508
Email: sales@rapid-erp.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
-
Buyer's data is hosted on the Rapid ERP Celonis tenant to which access is granted. The buyer is not the proprietor of the tenant.
50GB Data APC (Average processing Capacity) included in initial service. Further capacity can be purchased. - System requirements
-
- License purchases for access
- Compatible browser (MS Edge, Chrome, Firefox Mozille, Safari)
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- We aim to respond to email questions within 24 hours (durring working hours)
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Variable SLA depending on customer requirements. Our standard arrangement follows: Severity 1 - within 2 Service Hour Severity 2 - within 4 Service Hours Severity 3 - within 1 Service Day Severity 4 - within 2 Service Days
- Support available to third parties
- No
Onboarding and offboarding
- Getting started
-
User documentation
Virtual training (additional cost) - Service documentation
- Yes
- Documentation formats
-
- Other
- Other documentation formats
- PPTX
- End-of-contract data extraction
-
Final extraction of data is likely to be performed by Administrators:
OLAP table downloads to Excel
Extrac via .CSV file(s) (Action Flows) - End-of-contract process
- The contractual period is subject to the validity terms of the license agreement, which will require renewal on an annual basis. Once a contract (otherwise known as a Project for this service) comes to an end whereby licenses are not renewed, the results can be stored on the Rapid ERP Sandbox environment. The Project environment itself will remain active for 30 days and then subsequently deleted.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- Yes
- Compatible operating systems
-
- Linux or Unix
- Windows
- Other
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Both platforms provide an intuitive and responsive UI
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AAA
- Description of service interface
- Contemporary and intuitive web based user interface accessible via any desktop or mobile browser, with drag 'n' drop features.
- Accessibility standards
- WCAG 2.1 AAA
- Accessibility testing
- N/A
- API
- Yes
- What users can and can't do using the API
-
There are several ways to get data into the Celonis EMS, one of which is the data push API.
For pushing data, Celonis currently uses microbatching. Instead of inserting either huge chunks all at once, or inserting record by record, data meant to be pushed into the platform is structured into these so-called "microbatches."
As an exchange format, the commonly used Parquet or CSV file format is used.
The API provides an easy way of creating, executing, and monitoring microbatch jobs. After the data is available in the system, you can transform, analyze and work with it in the same way you would with a Celonis-provided extractor. - API documentation
- Yes
- API documentation formats
- Open API (also known as Swagger)
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- This service is designed to leverage on the standard process connectors and applications which provide pre-built data models, KPIs and analysis views. However, it is possible to customise this content by changing the features of the corresponding OLAP tables, changing chart types and designs or amending or introducing new filters. New tailored analyses can be built by selecting pre-built components into existing views or building new ones from scratch.
Scaling
- Independence of resources
- Celonis employs a number of techniques such as load balancing and horizontal scalability to handle load on the platform. Certain components of the platform are executed using guaranteed hardware resources to ensure performance isolation.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
In-built usage statistics within the Celonis platform including:
Uptime, Data Usage, User Audit Logs, Error Logs
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with SSAE-16 / ISAE 3402
- Other
- Other data at rest protection approach
-
All data at rest is encrypted with AES-256.
Our Cloud Service providers comply with security standards, controls and requirements as set out in ISO 27001 and in respect of the technical hosting of the Cloud Services.
Both AWS and Microsoft Azure possess certified compliance with all relevant industry standards, e.g. ISO 27001:2019 and SOC 2.
Audits for those reports are conducted in accordance with both the SSAE 16 and the ISAE 3402 professional standards. Furthermore, their Data centers are compliant with ISO/IEC 27018:2014. - Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- All analyses outputs and tables in Celonis can be exported as XLSX, CSV, PNG or PDF. This functionality can be restricted based on security configuration.
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- XLS
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- XLSX
- SAP HANA
- ORACLE DB
- MS SQL
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- Other
- Other protection within supplier network
- All data transferred to the Celonmis EMS is always encrypted via HTTPS using TLS 1.2 or higher.
Availability and resilience
- Guaranteed availability
- Availability uptime rate of 99.5% on a 24/7 basis
- Approach to resilience
-
Full details can be found here:
https://www.celonis.com/trust-center/ - Outage reporting
- Customers would be notified via email.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Other
- Other user authentication
-
SAML 2.0,
OpenID - Access restrictions in management interfaces and support channels
- Once login controls have been established, additional access and permission controls can be put in place by Administrators to restrict how users interact with instruments and objects within the Celonis EMS.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Username or password
- Other
- Description of management access authentication
-
SAML 2.0,
OpenID
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- ISO/IEC 27001
- Other
- Other security governance standards
- Please refer to: https://www.celonis.com/trust-center/#compliance
- Information security policies and processes
-
Celonis' security program is aligned with ISO 27000 Standards and industry best practices in order to keep all information and data safe. The focus of its security program is to prevent unauthorized access to customer data, take exhaustive steps to identify and mitigate risks, implement best practices, and constantly develop ways to improve. In order to achieve this, Celonis' regularly reviews and updates security policies, provides security training, performs application and network security testing, monitors compliance with security policies, and conducts internal and external risk assessments.
Their approach is to combine the most accepted standards — like ISO 27001 — with compliant Celonis security measures.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
The Celonis change management procedure defines the lifecycle management of change activities, including, but not limited to, coordination of changes, categorisation, management of change approvals and management of change implementation (deployment), and review of the changes. All changes are implemented following the four-eye principle.
The scope of the change management procedure addresses any change that impacts the production environment. This includes productive customer instances, backup systems, monitoring, network, and data center infrastructure. The procedure addresses coordination and approval of changes. The procedure provides a consistent methodology for requesting, classifying, authorizing, tracking, and reporting changes.
Full details provided on request. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
For the Celonis EMS Security Patches / Hot fixes are applied immediately
We are dedicated to keeping the entire technology stack up to date. Security updates are triggered by the suppliers of the individual systems and a regular security review ensures all systems are kept up do date. We follow the recommendations of third party providers such as Microsoft for the underlying OS layer and Oracle for Java environment and adopts the criticality level.
The customer is notified in a timely manner of any perceived risk that has not yet been mitigated against such that appropriate actions can be taken. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Celonis leverages the infrastructure of its cloud providers AWS and Azure. Both utilize a wide variety of automated monitoring systems to provide a high level of service performance and availability. Their monitoring tools are designed to detect unusual or unauthorized activities and conditions at ingress and egress communication points. These tools monitor server and network usage, port scanning activities, application usage, and unauthorized intrusion attempts. Systems within AWS and Azure are extensively instrumented to monitor key operational metrics. Alarms are configured to automatically notify operations and management personnel when early warning thresholds are crossed on key operational metrics.
- Incident management type
- Supplier-defined controls
- Incident management approach
-
Celonis standard principles of incident management consist of the following:
Detection and recording, Incident Classification for Resolution and Communication, Communication steps based on Severity, Investigation, Resolution and Recovery, Incident Handover, Closure and Post Incident Review, Incident Reporting and Analysis , Relation of Problem Management
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Our commitment to environmental sustainability is demonstrated through our robust environmental policy which minimises physical resource usage by adopting reduced printing practices and fully electronic document and invoicing systems. Furthermore, we encourage eco-friendly transportation options through our Cycle to Work (C2W) and Employee Electric Vehicle (EV) Scheme. These initiatives collectively contribute to reducing the carbon footprint associated with our operations and those of our clients, supporting the UK's transition to a greener economy.Covid-19 recovery
In response to COVID-19, we have launched a Digital Skills Academy to boost technological proficiency across public services, enhancing remote working capabilities and resilience. Additionally, our commitment under the Pledge 1% initiative sees our staff volunteering to support communities affected by the pandemic, directly aiding recovery efforts by strengthening community ties and fostering digital inclusion.Tackling economic inequality
Our approach to tackling economic inequality centres around digital empowerment through our Digital Skills and Code Club initiatives, which aim to equip individuals from diverse backgrounds with critical tech skills. This effort is complemented by our collaborative supply chain and partnership strategies that promote economic growth and opportunity within underserved communities, thereby fostering a more equitable digital economy.Equal opportunity
We advocate for equal opportunities through our Skills Academy and adherence to the Living Wage Foundation’s guidelines, ensuring fair compensation for all employees regardless of their role or background. This foundation enables us to attract a diverse workforce and create an inclusive environment where all employees can thrive, thereby enriching our service delivery and client relationships.Wellbeing
Our commitment to wellbeing is embodied in our comprehensive health offerings, including partnerships with Westfield Health, access to counselling services, and subscriptions to Headspace and Blinkist to support mental and intellectual growth. These benefits are extended to our employees and are part of our proposals to clients, ensuring that wellbeing is at the forefront of our workplace culture and service delivery.
Pricing
- Price
- £30,000.00 a unit
- Discount for educational organisations
- No
- Free trial available
- No