Skip to main content

Help us improve the Digital Marketplace - send your feedback

TASIKA LIMITED

OutSmart

We are an Intelligent Automation organisation providing end to end, and targeted Process Automation Software licenses and professional services. We also provide Business Process Management software and associated professional services.

Features

  • Intelligent Robotic Process Automation
  • Business Process Automation
  • Workflow Management
  • Low Code Automation
  • Intelligent Document Processing
  • Artificial Intelligence
  • Data Analytics
  • Data Visualisation

Benefits

  • Improve efficiency of business processes
  • Improved data quality
  • Enhanced customer service
  • Faster turnaround times for customers
  • Improve staff satisfaction

Pricing

£10,000 to £30,000 an instance

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at lee.melia@tasika.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

5 8 6 1 3 5 6 1 1 1 9 4 3 2 5

Contact

TASIKA LIMITED Lee Melia
Telephone: 07723915849
Email: lee.melia@tasika.co.uk

Service scope

Software add-on or extension
No
Cloud deployment model
Private cloud
Service constraints
There are no service constraints
System requirements
  • Virtual machines
  • Developer access to in-house systems

User support

Email or online ticketing support
Email or online ticketing
Support response times
Priority based ticket system with different expected response times dependant on ticket priority. Typical average response time is within one day
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
There are varying levels of support depending on the priority of the process(es) automated. P1 - 4 hour SLA P2 - 8 hour SLA P3 - 24 hour SLA A technical account manager would be provided to ensure the initial stages of ticket investigation is completed and the correct resources to rectify the issue are assigned.
Support available to third parties
No

Onboarding and offboarding

Getting started
The service can be wholly managed by Tasika, or training can be provided for customers to self-serve. Our recommended approach is to engage Tasika at the commencement of a project, and conduct a period of knowledge transfer if the customer wishes to move to a self-serve model. Many organisations however retain a level of ongoing support from Tasika. At the outset of the project, a full onboarding service is provided which includes the set up of any connectivity required in order to fulfil the service.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
We do not store any client data, however, customers source code of any code written on their behalf, can be downloaded and stored in a secure location from which they can access.
End-of-contract process
All customers have a 30 day notice period in which they can terminate, unless otherwise agreed in the contract. All code can be migrated to a secure location of the customers choice.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
Yes
Compatible operating systems
  • Linux or Unix
  • MacOS
  • Windows
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Only workflow can be used on hte mobile devices however forms via the workflow tool can be presented to 3rd parties including customers
Service interface
No
User support accessibility
None or don’t know
API
No
Customisation available
Yes
Description of customisation
Many processes are common across organisations, but have a level of customatisation based on their own individual systems. Modern automation tools are adaptable in order to work well with either the surface layer of your applications, or connect via API.

Low code automation allows customers to quickly adapt the code to meet their unique needs.

Scaling

Independence of resources
Development, Test and Production machines are provisioned individually per client basis

Analytics

Service usage metrics
Yes
Metrics types
Data can be provided on:
- Consumption, i.e. minutes usage
- Volume of work items processed
- Volume of work items unable to complete (exception cases)
Reporting types
Reports on request

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Digital Workforce, Safehouse Technologies, Complyradar

Staff security

Staff security clearance
Other security clearance
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
Never
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Data is not stored by Tasika, only code. Any code developed can be passed to the customer upon termination of services and can be shared using secure FTP
Data export formats
Other
Data import formats
Other

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • IPsec or TLS VPN gateway
  • Other
Other protection within supplier network
All Tasika data is fully protected using CheckPoint Security who are a global leader in the provision of data protection services.

Availability and resilience

Guaranteed availability
SLA's are aimed at providing a 99.9% uptime for the services. Defects and their investigation can be subject to a sliding scale of SLAs depending on the criticality of the process that has been automated. This will be agreed at the onboarding service definition phase Users will be provided with service credits if service cannot be provided.
Approach to resilience
Azure based (further details can be provided on request)
Outage reporting
Email alerts

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
Full role based access is in place across Tasika and their partners
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
Inspecta Sertifiointi Oy
ISO/IEC 27001 accreditation date
24/03/2023
What the ISO/IEC 27001 doesn’t cover
Certification covers our operations including full lifecycle of services in the Business Process Automation (BPA), and the supporting business processes. The certificate is valid on condition that the information security management system of the organization remains in compliance with the ISO/IEC 27001 standard. The certification does not cover activities by any subcontractors or technology partners.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Reuben Mifsud as Managing Partner is responsible for the adherence to the security policies and procedures. All policies are reviewed annually as part of of the Tasika risk framework and updated accordingly. Any breaches of the policy are required to be reported to Reuben Mifsud via the individual raising the breach or their line manager.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Our Change management process follows ITIL models and framework. All changes are logged in to an IT Service Management tool either directly or via integration including change progress and status documented in the tool so that our organization has always visibility to the change status. A dedicated Change Manager is accountable for our change management process as well as taking care of efficient Change advisory board (“CAB”) practices. CABs are focusing on assessing and approving all major changes. Additional attendees may be invited e.g. when further support for impact and risk assessment is needed
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Our information security policy is based on ISO/IEC 27001 standard and is updated continuously in accordance with the principles described in ISO/IEC 27001. All material changes to our activities, and other external changes related to the threat level, result in a revision of the policy and the guidelines relevant to information security. Corrective actions are taken based on the updated security assessment. Our Chief Information Security Officer (“CISO”) ensures that the information security policy, as well as guidelines, are utilized and acted upon. CISO also ensures the availability of sufficient training and information material for all users
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Our services are hosted in Microsoft Azure environment. Azure security has defined requirements for active monitoring. Service teams configure active monitoring tools in accordance with these requirements. Active monitoring tools include the Microsoft Monitoring Agent (MMA) and System Center Operations Manager. These tools are configured to provide time alerts in situations that require immediate action. In case of a security incident, following actions are taken:
1) Notification of the incident
2) Investigation of the incident and detailed reporting to customer
3) Corrective actions are taken to mitigate the effects and minimize any damage resulting from the security incident
Incident management type
Supplier-defined controls
Incident management approach
Our Incident Management process follows ITIL models and framework. The primary goal of our Incident Management process is to restore normal service operation as quickly as possible and minimize the adverse impact on business operations.
In case of an incident, following actions are taken:
1) Notification of the incident
2) Investigation of the incident
3) Corrective actions are taken to mitigate the effects and minimize any damage resulting from the security incident
4) Detailed reporting to customer
All incidents are logged into our Service Management tool including incident progress and resolutions so that we retain visibility of current ticket status.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Tackling economic inequality
  • Equal opportunity

Tackling economic inequality

Tasika engages with partner training agencies to recruit from pools of people re-training in the technical skills required to move into a digital based role. Our recruitment has also been focused on recruiting graduates and upskilling in core technical competencies and promoting from within where possible.
Equal opportunity
Tasika is dedicated to fostering an inclusive workplace environment where all employees are treated with respect and dignity. We are committed to equal employment opportunities for all individuals regardless of race, color, religion, sex, national origin, age, disability, or any other characteristic protected by law."

Equal opportunity

Tasika is dedicated to fostering an inclusive workplace environment where all employees are treated with respect and dignity. We are committed to equal employment opportunities for all individuals regardless of race, color, religion, sex, national origin, age, disability, or any other characteristic protected by law."

Pricing

Price
£10,000 to £30,000 an instance
Discount for educational organisations
Yes
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at lee.melia@tasika.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.