OutSmart
We are an Intelligent Automation organisation providing end to end, and targeted Process Automation Software licenses and professional services. We also provide Business Process Management software and associated professional services.
Features
- Intelligent Robotic Process Automation
- Business Process Automation
- Workflow Management
- Low Code Automation
- Intelligent Document Processing
- Artificial Intelligence
- Data Analytics
- Data Visualisation
Benefits
- Improve efficiency of business processes
- Improved data quality
- Enhanced customer service
- Faster turnaround times for customers
- Improve staff satisfaction
Pricing
£10,000 to £30,000 an instance
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
5 8 6 1 3 5 6 1 1 1 9 4 3 2 5
Contact
TASIKA LIMITED
Lee Melia
Telephone: 07723915849
Email: lee.melia@tasika.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- There are no service constraints
- System requirements
-
- Virtual machines
- Developer access to in-house systems
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Priority based ticket system with different expected response times dependant on ticket priority. Typical average response time is within one day
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- There are varying levels of support depending on the priority of the process(es) automated. P1 - 4 hour SLA P2 - 8 hour SLA P3 - 24 hour SLA A technical account manager would be provided to ensure the initial stages of ticket investigation is completed and the correct resources to rectify the issue are assigned.
- Support available to third parties
- No
Onboarding and offboarding
- Getting started
- The service can be wholly managed by Tasika, or training can be provided for customers to self-serve. Our recommended approach is to engage Tasika at the commencement of a project, and conduct a period of knowledge transfer if the customer wishes to move to a self-serve model. Many organisations however retain a level of ongoing support from Tasika. At the outset of the project, a full onboarding service is provided which includes the set up of any connectivity required in order to fulfil the service.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- We do not store any client data, however, customers source code of any code written on their behalf, can be downloaded and stored in a secure location from which they can access.
- End-of-contract process
- All customers have a 30 day notice period in which they can terminate, unless otherwise agreed in the contract. All code can be migrated to a secure location of the customers choice.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
-
- Linux or Unix
- MacOS
- Windows
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Only workflow can be used on hte mobile devices however forms via the workflow tool can be presented to 3rd parties including customers
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- No
- Customisation available
- Yes
- Description of customisation
-
Many processes are common across organisations, but have a level of customatisation based on their own individual systems. Modern automation tools are adaptable in order to work well with either the surface layer of your applications, or connect via API.
Low code automation allows customers to quickly adapt the code to meet their unique needs.
Scaling
- Independence of resources
- Development, Test and Production machines are provisioned individually per client basis
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Data can be provided on:
- Consumption, i.e. minutes usage
- Volume of work items processed
- Volume of work items unable to complete (exception cases) - Reporting types
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Digital Workforce, Safehouse Technologies, Complyradar
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- Never
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- Data is not stored by Tasika, only code. Any code developed can be passed to the customer upon termination of services and can be shared using secure FTP
- Data export formats
- Other
- Data import formats
- Other
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- IPsec or TLS VPN gateway
- Other
- Other protection within supplier network
- All Tasika data is fully protected using CheckPoint Security who are a global leader in the provision of data protection services.
Availability and resilience
- Guaranteed availability
- SLA's are aimed at providing a 99.9% uptime for the services. Defects and their investigation can be subject to a sliding scale of SLAs depending on the criticality of the process that has been automated. This will be agreed at the onboarding service definition phase Users will be provided with service credits if service cannot be provided.
- Approach to resilience
- Azure based (further details can be provided on request)
- Outage reporting
- Email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Full role based access is in place across Tasika and their partners
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Inspecta Sertifiointi Oy
- ISO/IEC 27001 accreditation date
- 24/03/2023
- What the ISO/IEC 27001 doesn’t cover
- Certification covers our operations including full lifecycle of services in the Business Process Automation (BPA), and the supporting business processes. The certificate is valid on condition that the information security management system of the organization remains in compliance with the ISO/IEC 27001 standard. The certification does not cover activities by any subcontractors or technology partners.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Reuben Mifsud as Managing Partner is responsible for the adherence to the security policies and procedures. All policies are reviewed annually as part of of the Tasika risk framework and updated accordingly. Any breaches of the policy are required to be reported to Reuben Mifsud via the individual raising the breach or their line manager.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Our Change management process follows ITIL models and framework. All changes are logged in to an IT Service Management tool either directly or via integration including change progress and status documented in the tool so that our organization has always visibility to the change status. A dedicated Change Manager is accountable for our change management process as well as taking care of efficient Change advisory board (“CAB”) practices. CABs are focusing on assessing and approving all major changes. Additional attendees may be invited e.g. when further support for impact and risk assessment is needed
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Our information security policy is based on ISO/IEC 27001 standard and is updated continuously in accordance with the principles described in ISO/IEC 27001. All material changes to our activities, and other external changes related to the threat level, result in a revision of the policy and the guidelines relevant to information security. Corrective actions are taken based on the updated security assessment. Our Chief Information Security Officer (“CISO”) ensures that the information security policy, as well as guidelines, are utilized and acted upon. CISO also ensures the availability of sufficient training and information material for all users
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
Our services are hosted in Microsoft Azure environment. Azure security has defined requirements for active monitoring. Service teams configure active monitoring tools in accordance with these requirements. Active monitoring tools include the Microsoft Monitoring Agent (MMA) and System Center Operations Manager. These tools are configured to provide time alerts in situations that require immediate action. In case of a security incident, following actions are taken:
1) Notification of the incident
2) Investigation of the incident and detailed reporting to customer
3) Corrective actions are taken to mitigate the effects and minimize any damage resulting from the security incident - Incident management type
- Supplier-defined controls
- Incident management approach
-
Our Incident Management process follows ITIL models and framework. The primary goal of our Incident Management process is to restore normal service operation as quickly as possible and minimize the adverse impact on business operations.
In case of an incident, following actions are taken:
1) Notification of the incident
2) Investigation of the incident
3) Corrective actions are taken to mitigate the effects and minimize any damage resulting from the security incident
4) Detailed reporting to customer
All incidents are logged into our Service Management tool including incident progress and resolutions so that we retain visibility of current ticket status.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Tackling economic inequality
- Equal opportunity
Tackling economic inequality
Tasika engages with partner training agencies to recruit from pools of people re-training in the technical skills required to move into a digital based role. Our recruitment has also been focused on recruiting graduates and upskilling in core technical competencies and promoting from within where possible.
Equal opportunity
Tasika is dedicated to fostering an inclusive workplace environment where all employees are treated with respect and dignity. We are committed to equal employment opportunities for all individuals regardless of race, color, religion, sex, national origin, age, disability, or any other characteristic protected by law."Equal opportunity
Tasika is dedicated to fostering an inclusive workplace environment where all employees are treated with respect and dignity. We are committed to equal employment opportunities for all individuals regardless of race, color, religion, sex, national origin, age, disability, or any other characteristic protected by law."
Pricing
- Price
- £10,000 to £30,000 an instance
- Discount for educational organisations
- Yes
- Free trial available
- No