Skip to main content

Help us improve the Digital Marketplace - send your feedback

Agile Business Process UK, LIMITED

Intelligent Document Understanding - UiPath

Our certified Consultants deliver best in class Automation Solutions using AI (Artificial Intelligence), Low-Code BPM (Business Process Management) , Process/Task Mining, OCR (Optical Character Recognition), ODM (Operational Decision Management) and Virtual Assistants/Chatbots. We are partnered with market leading companies such as ABBYY, AutomationHero, Bizagi, Camunda, Celonis, IBM, Soroco and UiPath.


  • Drag and drop activities
  • Document Understanding Process Template
  • Receive Validation request if bot gives a Low confidence score
  • Retraining capabilities in AI Center to train robots


  • Built to process various document types
  • Accuracy improving over time
  • Out-of-the-box AI solutions
  • End-to-end automation of complex processes


£7,500 an instance a year

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 13

Service ID

5 0 9 9 7 1 1 8 4 2 5 4 1 7 0


Agile Business Process UK, LIMITED Mark O'Connor
Telephone: +447464152100

Service scope

Software add-on or extension
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints
Planned Maintenance and regular updates to the Cloud Platform are updated in the portal, For support exclusions, refer to the 'Support Exclusion' clause in the Support Terms available here:
System requirements
  • Studio: S/w Requirements:
  • Robots - H/w Requirements:
  • Robots - S/w Requirements:
  • Orchestrator (Cloud Platform)
  • Studio: H/w Requirements:

User support

Email or online ticketing support
Yes, at extra cost
Support response times
Our standard support response times range from 1 to 8 hours depending on the incident categorisation and prioritisation as defined in a tailored service level agreement (SLA) per service. The tailored SLA also defines the agreed hours of support service available which can range from 24x7 to weekdays between 09:00 to 17:00 GMT.
User can manage status and priority of support tickets
Online ticketing support accessibility
None or don’t know
Phone support
Web chat support
Onsite support
Yes, at extra cost
Support levels
We have 3 support levels 1. 40 hours of support - £3,600 per quarter 2. 80 hours of support - £7,200 per quarter 3. Managed service - 1 FTE per quarter - £12,000 per quarter. We can provide both a technical account manager and cloud support, engineer.
Support available to third parties

Onboarding and offboarding

Getting started
A strong differentiator for UiPath is our Learning Culture. It is critical for UiPath to make significant global investments in our people, partners, customers, industry and academia. UiPath has a free E-Learning platform (, that speeds up the learning and proficiency curve. Training for development, management and reporting consists of three levels: starting with the Foundation course, followed by the Orchestrator and then the Advanced courses. These courses are available online, free of charge and are self-led through the UiPath Academy.

Advanced courses can also be delivered as classroom training through our UiPath Official Training Partners ( or in some cases, directly provided by UiPath. UiPath has 18 training partners, covering all regions. Role-based training is available and the training can be customized for the customer.

We also provide online resources including documentation, videos, knowledge base, and FAQs, available here:
Service documentation
Documentation formats
End-of-contract data extraction
From a GDPR standpoint, UiPath is considered a data processor. As such, we honor all obligations of a data processor by providing customers with full control over their data, in accordance with the product architecture and implementation.
We have ensured that we can export all of your data for you upon request. Should you close your account with UiPath Cloud Platform, or otherwise request data deletion, we delete that data from our systems after the requisite 30-day soft-delete period.
We recommend our customers assess if their use of our Cloud Platform is in line with their privacy obligations. For more information about UiPath’s privacy statement, how UiPath processes your data when using online services, and GDPR commitments, please visit our Privacy Policy:
End-of-contract process
End of contract process will be provided in user agreements. At a high level, on contract termination, all data will be exported to customer on request as per GDPR guidelines. The UiPath cloud platform follows the same guidelines as Microsoft Azure, the underlying storage platform for data destruction on contract termination. These are available at

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
Application to install
Compatible operating systems
Designed for use on mobile devices
Differences between the mobile and desktop service
UiPath has the Orchestrator Mobile App, which is available in the Apple App Store and Google Play Store. The Orchestrator is not designed to be used on mobile browsers/ web browsers. The mobile app only offers a light-view into the customers' Orchestrator instances. With the Orchestrator app, you can perform the following: Monitor Robots and Queues, search assets, start, stop, or kill jobs. With the mobile app, you can also mark processes and jobs as 'Favorite' and monitor the processes using Push notifications. These two features are not available in the Orchestrator service.
Service interface
User support accessibility
None or don’t know
Description of service interface
UiPath Cloud Platform is composed of multiple independent services, such as Orchestrator, Tenant Management, Licensing Service, and others. To provide a seamless experience, we work hard to abstract these details from the end user and offer these services through a common front-end called UiPath Cloud Portal. All the services along with the Cloud Portal are packaged together as UiPath Cloud Platform and delivered via a software-as-a-service (SaaS) model that’s built and hosted in Microsoft Azure. All services use core Azure services, including compute, storage, networking, SQL database, and identity and access management services.
Accessibility standards
WCAG 2.1 AA or EN 301 549
Accessibility testing
UiPath integrates accessibility into design, develop and quality assurance processes of its dependent products. Compliance to accessibility standards are evaluated through the use of automated testing, manual validation with assistive technologies, and support form third party source.
What users can and can't do using the API
From the integration perspective, for automation, Cloud Platform (SaaS) or Cloud Deployment can integrate with applications via the APIs. Orchestrator’s REST API fully programmatically supports all operations on the server-side like adding robots, processes, assets, queues and starting/ stopping/ scheduling processes. This is the standard way to integrate with external BPM or workflow tools, ERP, CRM or any other applications . Orchestrator REST API is powerful enough to integrate seamlessly with partner BPM systems or any other applications, providing 22 Custom API methods for access and control of 29 logical resources within Orchestrator (for example, Jobs, Logs, Queues, Robots and Settings). As an example of how users can use this, an external application such as a chatbot can easily trigger the robots to perform a task based on input in the chatbot. Refer here for more information on the APIs:
API documentation
API documentation formats
  • Open API (also known as Swagger)
  • HTML
API sandbox or test environment
Customisation available


Independence of resources
UiPath Cloud Platform has been designed to be ready for growth, with excess capacity planned according to the expected expansion of customers. As we scale the cloud up and ensure it keeps it customer promises, we are re-actively monitoring the capacity based on engineering feedback. Our engineering team has worked on some of the world’s largest cloud platforms and understand the nuances of scaling cloud environments successfully and with high reliability.


Service usage metrics
Metrics types
Customers can view the availability of the services and incidents that have occurred using the portal:

Monitoring of usage and performance (response time, number of transactions, etc) is limited to UiPath's Site reliability engineers' access and this is performed to ensure continuous improvement of our service.
Reporting types
Real-time dashboards


Supplier type
Reseller providing extra features and support
Organisation whose services are being resold

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Encryption of all physical media
  • Other
Other data at rest protection approach
Each Customer is issued their own vault that stores certificates, keys, and any other credentials working between services. Additionally, all user accounts and application accounts are tied to a customer identity that serves as a separate domain. All database storage leverages AES CBC 256 or 128 where 256 is not available. Logical separation is created by means of encryption and separate accounts between services for each customer.
Data sanitisation process
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
All data is accessible to customers via the UI of the Cloud Platform. In case customer wants to export data, the request for data export must be placed with UiPath who will perform the database export.
Data export formats
Data import formats
Other data import formats
  • Data cannot be imported but created in the Cloud Platform.
  • Manual steps for migration from on-prem to cloud-platform are available.

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
UiPath will make commercially reasonable efforts to provide to Customer an uptime of 99.5%. Uptime is measured per service per region. The availability of the hosted service will be communicated to the Customer on the webpage or through other channels, as appropriate. SLAs are specified in the user agreement.
Approach to resilience
The UiPath Cloud platform leverages Azure resiliency natively for all components. Currently replication is only between datacenters in the geographic region (within the US or within the EU). This could be expanded based on customer requirements. Refer here for more information:
Outage reporting
The availability of the hosted service and any incidents/outages will be communicated to the Customer on the webpage. In the portal, customers can sign up for notifications and alerts via their preferred communication method: email, text, ATOM, or RSS feed.

Identity and authentication

User authentication needed
User authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
  • Other
Other user authentication
Bulk Provisioning of users is available via integration into common Identity providers such as Azure AD, LinkedIn, and Google. UiPath’s cloud platform allows for Single Sign On from a customer’s existing cloud identity platform including Azure Active Directory and Google Suite. Customers that leverage additional services such as Okta for example, are able to leverage an Azure Active Directory Tenant that supports SAML v2 federation to Okta to provide single sign on to the UiPath cloud platform. If the identity provider integrated (such as Google) requires two-factor authentication, the same applies when user logs in to the UiPath Cloud Platform.
Access restrictions in management interfaces and support channels
We maintain strict control over who has access to our production environment and customer data. UiPath has a team of Site Reliability Engineers (SREs) who will monitor and manage production environment 24x365. The SREs will require access to the production environment only in cases of maintenance and support. UiPath support operates on the principle of least privilege and has no access to the environment unless first approved by the customer. Access to production service is provided on a "just in time" basis and revoked as soon as the situation is resolved. Access requests and approvals are tracked.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password
  • Other
Description of management access authentication
All UiPath employees are required to use VPN approved by the organization.Access is granted on least privilege basis and only after proper justifications are provided and verified. If a team member needs access to resolve an urgent issue or deploy a configuration change, they must apply for "just in time" access to the production service. Access is revoked as soon as the situation is resolved. Access requests and approvals are tracked. We use two-factor authentication for all production system access.

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
ISO 27001 granted by Schellman & Company.
ISO/IEC 27001 accreditation date
Accreditation issued March 20, 2020.
What the ISO/IEC 27001 doesn’t cover
The certification covers our Studio, Studio X, Robot, Agent Desktop, Orchestrator, Activity Packs and Insights with regards to our core platform. With our cloud offering, it covers our Cloud Portal, Cloud Services (Document Understanding, Computer Vision, Licensing, Orchestrator) and our Automation Hub Platform.
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Cyber essentials
Cyber essentials plus
Other security certifications
Any other security certifications
  • Veracode continuous for our Cloud Platform:
  • In-progress- SOC 2 Type 2, SOC 2 Type 1
  • ISO 9001

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
UiPath has an internal Cyber Security Policy that defines the cyber security procedures and measures implemented by UiPath and subsidiaries in order to protect the confidentiality, integrity and availability of the company’s information assets in accordance with business objectives and applicable laws and regulations. UiPath’s Cyber Security governance framework is based on the following principles:
1. Ensuring security of UiPath critical information and systems is a shared responsibility.
2. The Global Cyber Security Policy is approved by UiPath management, published and communicated to all users (employees, contractors, freelancers, vendors and collaborators).
3. The policy will be subject to continuous monitoring and regular improvement and will be reviewed annually and modified if significant changes occur.
4. All data stored and processed by UiPath will be handled according to an appropriate level of confidentiality and in compliance with relevant regulatory and contractual requirements.
5. Cyber security roles and responsibilities will be defined and communicated.

This policy along with other subsequent policies are provided as training to all employees. Violation of policies lead to disciplinary action, upto termination of employment.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
For configuration changes to the service, for the regular maintenance of the cloud platform, which may happen every two weeks, updates are done in Deployment rings, and notification to customers are provided via the portal: . Major updates are also announced in release notes.
For infrastructure changes, UiPath Cloud Platform is hosted in the Azure Data Centers. A change in storage location or infrastructure would be treated as an infrastructure incident triggering notification of the customer. UiPath has a dedicated team to work with Microsoft and the Azure team who would be notified immediately of any proposed change.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
For external vulnerability testing, UiPath uses the services of Veracode VAPT. UiPath Robots, UiPath Studio, and our on-premise (standalone) Orchestrator are Veracode Continuous Certified. For the Cloud Platform, we have Veracode certification, ISO 27001, and working towards SOC 2 report. We also monitor vulnerabilities introduced in our code base through third-party libraries and minimize our dependency on these libraries and corresponding exposure. We also participate in the HackerOne Bounty Program to identify vulnerabilities in our RPA Platform and surrounding ecosystem. UiPath Cloud Services use Azure's PaaS which automatically provides regular updates for known security vulnerabilities in infrastructure.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
UiPath employs a 24/7 Site Reliability Team that monitors security alerts and incidents. UiPath monitors access management, application, system, and network traffic both at the perimeter and within the environment to prevent any malicious activity and to track availability and performance.
In the event of a breach, we use security response plans to minimize data leakage, loss, or corruption. We provide transparency to our customers throughout the incident ( Once the issue is contained, our security incident management process continues as we identify the root cause and track the necessary changes to ensure we prevent similar issues in the future.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Customers can raise a ticket through our online ticketing portal or use phone-in support based on the support model purchased. In the event of a breach, we use security response plans to minimize data leakage, loss, or corruption. Our 24x7 SRE and Security team identify the issue and engage the development team resources to contain the impact of the incident. Once the team has contained an issue, our security incident management process continues as we identify the root cause and track the changes to ensure we prevent similar issues in the future.Incident management for the infrastructure is managed by Azure

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks

Social Value

Fighting climate change

Fighting climate change

Intelligent Document Capture on Cloud successfully digitalises the transfer and understanding of paper documents reducing the historical paper trail.


£7,500 an instance a year
Discount for educational organisations
Free trial available
Description of free trial
30 Day Free Trial

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.