UiPath
We resell UiPath's intelligent Digital Workforce platform which provides RPA as a service for businesses of all sizes. Highly intuitive and reliable, it is suitable for business users and managers through to technical RPA developers and allows the robotisation of repetitive and logical processes.
Features
- Drag and drop easily create Bots (Automated Processes)
- Local or Web Interface: intuitive user experience on devices
- Orchestrator - Centralized control for managing robotic process automation workflows.
- UiPath Robot component to execute automations on machines
- Pluggable architecture provides even greater flexibility and extensibility
- Single recorder captures and automates processes instantly.
- Add Python, VBScript, and JavaScript to create more sophisticated bots.
- Create intelligent bots by combining with ML, NLP and more.
- Single step through debugging, version control.
- Extensive library of pre-built automation components.
Benefits
- One stop solution for front-end, back-end and cognitive
- Has features and product suite to encapsulate all RPA requirements
- Achieve Automation Benefits in weeks
- Suitable for Developers, Citizen Users, IT Users etc.
- Application Agnostic, various deployment options
- Boosts productivity by freeing up time from manual tasks
- Delivers rapid return on investment (ROI) with quick implementation
- Extensive security features
- Streamlines operations for increased efficiency
- Enhances accuracy and reduces errors in business processes.
Pricing
£20,000 a licence
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
6 2 7 8 7 5 7 0 0 5 7 2 9 3 6
Contact
EXTRA TECHNOLOGY LIMITED
Paul Donoghue-Parker
Telephone: 07739340099
Email: paul.donoghue-parker@extratechnology.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- UiPath can be an extension to any Windows, local software or web-based application. It automates complex business processes that are conducted within one or many of these systems. For certain applications, such as Microsoft Excel, Salesforce and ServiceNow, there are specific integrations that make UiPath an extension of those platforms.
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- UiPath bots can only be run on a Windows (7, 8, 10,11 and Server) machine, therefore the platform can only automate applications that are supported by that operating system.
- System requirements
-
- Please see web link provided below for latest information
- https://docs.uipath.com/studio/standalone/2023.10/user-guide/hardware-and-software-requirements
User support
- Email or online ticketing support
- Yes, at extra cost
- Support response times
-
Product Support Level 1 and 2 provided by the reseller.
Bot development support from Extra Technology is also available on request but there are additional costs associated. - User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Yes, at an extra cost
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- WCAG 2.1 AAA
- Web chat accessibility testing
- N/A
- Onsite support
- Yes, at extra cost
- Support levels
-
Both inclusive and paid support models available. For paid model, costs vary based on licensing and support level required.
Extra Technology can also provide bespoke managed service support at a cost. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Ensuring a smooth start in terms of product installation and customer relationship is crucial. Our team will ensure the product is successfully installed and working correctly. We have extensive technical knowledge and are known as industry experts. In addition, as one of UiPath's high level resale and consultancy partners, We have direct access to the technical support and product teams, as well as excellent C-level relationships. We also have our own support team that provide product and bot development support.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- When a customer's contract ends, they can extract their data using UiPath's data export functionality. UiPath provides tools and documentation to help customers export their data in a structured format, such as CSV or Excel.
- End-of-contract process
-
End of Contract:
At the end of the contract period, several scenarios may unfold:
Renewal - If both parties are satisfied, the contract can be renewed for another term.
Termination - The contract may terminate due to completion, dissatisfaction, or other reasons.
Transition - If the project continues, there might be a transition phase to ensure a smooth handover.
Included in the Price:
Software Licenses - The core UiPath software licenses are typically part of the base price.
Standard Support - Basic support services, including bug fixes and updates.
Training Materials - Access to training resources and documentation.
Initial Implementation - Setting up UiPath tools and configuring processes.
Additional Costs:
Customization - Tailoring UiPath solutions to specific business needs.
Advanced Support - Premium support tiers with faster response times.
Consulting Services - Expert guidance for complex projects.
Add-On Modules - Extra features beyond the standard package.
Cloud Infrastructure - Costs related to hosting on UiPath Cloud.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Application to install
- Yes
- Compatible operating systems
-
- Linux or Unix
- MacOS
- Windows
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
-
The UiPath Orchestrator Mobile App delivers anywhere, anytime access to powerful tools designed to help you achieve better business results:
Real-time alerts on the overall status of your RPA system for faster response times.
Alert filtering and search capabilities that provide fast, easy access to the information you need.
Visual, easy-to-understand dashboards and charts that provide performance insights and the data to make better decisions.
Complete visibility into job and Robot status to minimize surprises and maximize productivity. - Service interface
- Yes
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- Description of service interface
- UiPath has an API (Application Programming Interface) that allows users to deploy bots, manage files, administrate users and more. This is accessible through the REST protocol and allows full programatic access of the platform.
- Accessibility standards
- WCAG 2.1 AA or EN 301 549
- Accessibility testing
-
UiPath has conducted usability testing with users of assistive technology to ensure that its products are accessible and usable by individuals with disabilities. UiPath has tested its products with screen reader software such as JAWS, NVDA, and VoiceOver, as well as with other assistive technologies such as keyboard-only navigation and high contrast mode.
During usability testing, UiPath has worked with users of assistive technology to identify and address accessibility issues, such as missing or inaccurate alternative text for images, inaccessible form fields, and confusing navigation structures. UiPath has also incorporated feedback from users of assistive technology into its product design and development process to ensure that accessibility is considered from the outset. - API
- Yes
- What users can and can't do using the API
-
UiPath provides an API that allows programmatic access to the functionality and data within the UiPath platform.
Orchestrator API:
Manage robots, processes, and jobs.
Access queues and transactions.
User and role management.
Monitor performance and control execution.
Automation Cloud API:
Tenant and user management.
Access services and resources.
Monitor usage and metrics.
System APIs:
Retrieve system info.
Manage files and registry.
Execute PowerShell scripts. - API documentation
- Yes
- API documentation formats
- Open API (also known as Swagger)
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- UiPath RPA can be customized to meet specific business needs and requirements. Users can customize workflows using UiPath Studio's drag-and-drop interface, integrate with third-party applications, create custom activities, and scale the solution as needed. Customization options are available to all users with appropriate permissions, including business analysts, developers, and IT staff. Customization can be done through UiPath's user-friendly interface, which allows users to easily modify and configure automation workflows to meet their specific needs.
Scaling
- Independence of resources
- UiPath uses measures such as scalability, resource allocation, load balancing, monitoring and alerting, and service level agreements to ensure that users are not affected by demand from other users. These measures help to ensure that the UiPath platform is highly available, performant, and able to handle increased workloads and user demand.
Analytics
- Service usage metrics
- Yes
- Metrics types
- UiPath provides a range of service metrics to help customers monitor and optimize their RPA deployments, including robot utilization, workflow execution time, error rates, throughput, availability, scalability, and compliance. These metrics help customers ensure that their RPA deployments are running smoothly and efficiently, and that they are meeting their business objectives.
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- UiPath
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Bot files, audit logs and insight dashboards. Everything can be exported as either XML, CSV or PDF's.
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- XML
- XAML
- JSON
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- Word
- Database
- HTML
- JSON
- Images
- Excel
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Bonded fibre optic connections
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- UiPath's SLA availability is 99.9%
- Approach to resilience
- Available on request
- Outage reporting
-
UiPath promptly communicates and reports outages to users through various channels. Here’s how they handle incidents:
UiPath Status Page:
UiPath maintains a public status page that provides real-time updates on service availability, incidents, and resolutions.
Users can check this page to stay informed about ongoing issues and recent resolutions.
Incident History:
UiPath documents past incidents, including details about the issue, impact, and resolution.
Users can review historical incidents to understand the platform’s reliability.
Notifications and Alerts:
UiPath sends notifications via email or other channels to inform users about outages, maintenance, or performance degradation.
These alerts help users stay informed and take necessary actions.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
-
UiPath restricts access in management interfaces and support channels through several methods:
Role-Based Access Control: Access to management interfaces and support channels is restricted based on predefined roles and permissions. Users are granted access only to the functionalities necessary for their roles within the organization.
Authentication Mechanisms: Management interfaces and support channels typically require users to authenticate themselves through secure login procedures, such as username/password authentication or 2-factor authentication. This ensures that only authorized individuals can access these interfaces and channels.
Encryption: Data transmitted between users and management interfaces or support channels is encrypted to prevent unauthorized access or interception. - Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- ISO 27001 granted by Schellman & Company
- ISO/IEC 27001 accreditation date
- Accreditation issued March 20, 2020.
- What the ISO/IEC 27001 doesn’t cover
-
The certification covers our Studio, Studio X, Robot, Agent Desktop,
Orchestrator, Activity Packs and Insights with regards to our core
platform. With our cloud offering, it covers our Cloud Portal, Cloud
Services (Document Understanding, Computer Vision, Licensing,
Orchestrator) and our Automation Hub Platform - ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
-
- Veracode continuous for our Cloud Platform: https://veracode.com/verified/directory/uipath
- SOC 2 Type 2, SOC 2 Type 1
- ISO 27001
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- CSA CCM version 3.0
- ISO/IEC 27001
- Other
- Other security governance standards
-
ISO 27001
SOC 2
GDPR
HIPAA
NIST
CSA STAR - Information security policies and processes
-
UiPath places a high priority on data protection and security, employing robust policies and processes to ensure a secure environment. Security is ingrained into every aspect of their operations:
Security by Design is a fundamental principle at UiPath. Each product undergoes design and development with security as a primary consideration. Security measures are integrated into the development lifecycle, including automated security scans and penetration tests for every build.
Certifications and Compliance are key aspects of UiPath's security strategy. The company adheres to industry standards and certifications such as ISO/IEC 27001 and SOC 2. Data encryption both at rest and in transit is employed to provide robust protection for sensitive information.
Data Privacy and Governance are meticulously managed by UiPath. Compliance with privacy regulations like GDPR is a priority, ensuring that user data is handled with care and in accordance with legal requirements. Independent audits verify conformity with relevant implementation specifications within regulations like the HIPAA Security, Privacy, and Breach Notification Rules.
Transparency and Communication are core values at UiPath. They maintain a public status page that provides real-time updates on service availability and incidents. Additionally, historical incident documentation is available to help users understand the reliability of UiPath's services.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- UiPath uses a formal configuration and change management process to ensure that changes to its services are tracked, assessed, and implemented in a controlled manner. Components of UiPath's services are tracked through their lifetime using version control and configuration management tools. Changes are assessed for potential security impact using a formal change management process that includes risk assessment, testing, and approval by relevant stakeholders. This process helps to ensure that changes are implemented in a secure and controlled manner, minimizing the risk of security incidents or service disruptions.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- UiPath has a formal vulnerability management process that includes regular vulnerability scanning, risk assessment, and patch management. Potential threats to UiPath's services are assessed using a combination of automated vulnerability scanning tools and manual testing. UiPath deploys patches to its services as quickly as possible, based on the severity of the vulnerability and the potential impact on customers. UiPath gets its information about potential threats from a variety of sources, including security advisories, vendor notifications, and industry best practices. This process helps to ensure that UiPath's services are secure and protected against potential threats.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- UiPath has a formal protective monitoring process that includes regular security monitoring, incident response, and forensic analysis. UiPath uses a combination of automated monitoring tools and manual review to identify potential compromises to its services. When a potential compromise is identified, UiPath follows a formal incident response process that includes containment, eradication, and recovery. UiPath responds to incidents as quickly as possible, based on the severity of the incident and the potential impact on customers. This process helps to ensure that UiPath's services are secure and protected against potential threats.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- UiPath has a formal incident management process that includes pre-defined processes for common events, incident reporting, and incident response. UiPath provides customers with a range of options for reporting incidents, including email, phone, and online support. UiPath follows a formal incident response process that includes containment, eradication, and recovery. UiPath provides incident reports to customers as soon as possible, based on the severity of the incident and the potential impact on customers. This process helps to ensure that UiPath's services are secure and protected against potential threats.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Covid-19 recoveryCovid-19 recovery
The use of automation software solutions can help 'support organisations and businesses to manage and recover from the impacts of COVID-19'. It can do this by allowing businesses to leverage automation to make cost savings, increase productivity, reduce errors, decrease time to market and enable the business to do more with the some amount of resources. It can also help staff morale, taking mundane, repetitive tasks away from humans and allowing them to focus on more interesting and fulfilling areas.
Pricing
- Price
- £20,000 a licence
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- This 60-day trial provides access to UiPath Studio and StudioX for designing and developing automations, as well as an Attended Robot to assist with everyday tasks. This trial does not include any other UiPath products.