Process Automation Services (powered by Luminai)
Hitachi Digital Services' and Luminai's Large Action Model (LAM) is a new AI model that can interact and take action on any type of user interface, on any system and application, just like a human does, to automate complex mission critical processes across the healthcare enterprise.
Features
- cutting-edge AI technology, known as a Large Action Model (LAM)
- trained to interact, take action automate complex processes across enterprises
- LAM understands business intent/objective
- already trained on how to interact with systems and applications
- platform reads and interprets the business intent creating action steps
- LAM does not use integrations (APIs/HL7s/FHIR/X12s/etc.)
- Overlays on existing systems and works with existing systems
Benefits
- technology can read and understand business intent behind text/SOPs
- Create clear steps for AI to perform, without coding/integrations
- simple/easy way to train the model on bespoke workflows
- extremely fast to deploy—a matter of days for automation
Pricing
£530,000 a unit
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
6 7 0 3 3 7 9 0 3 5 2 6 4 4 7
Contact
HITACHI DIGITAL SERVICES UK LIMITED
Public Sector Team
Telephone: 07707585971
Email: HCUK.BidTeam@hitachivantara.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- Can be extended to a variety of service offerings as an extension to automate workflows
- Cloud deployment model
- Private cloud
- Service constraints
- Intended to be used across any web-based application that be accessed via a browser. It may have limitations when used for natively installed, desktop applications.
- System requirements
-
- Requires user authentication and credentials to access the systems
- In which processes are performed by humans today
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Per agreed SLAs
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), 7 days a week
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- Via browswer
- Web chat accessibility testing
- Upon request
- Onsite support
- Yes, at extra cost
- Support levels
- Hitachi DS to respond
- Support available to third parties
- No
Onboarding and offboarding
- Getting started
-
We provide an overarching SDLC approach including discovery, design, development, implementation and support for Large Action Models.
We scope and understand the current state operations of the desired process(es) to automate. We work with the buyer on understanding automation opportunities and establishing business case and prioritisation of opportunities. We build, test, deploy, support, and maintain bespoke automations for your organisation. - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Solution does not store or retain any customer data
- End-of-contract process
- Will assist customer with a post-termination transition at request for no more than 360 calendar days chargeable per rate card.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- No
- Customisation available
- Yes
- Description of customisation
- Authorised resources can customise
Scaling
- Independence of resources
- We have 2 types of services that we provide. Server side and Local on customer machine through our extension. On server side we have auto scaling enabled, that makes sure all requests are accepted and worked on. The local service, as the name suggests runs locally on the a customer agent's machine, with the fist initial call for authorization/authentication. The service used in this case is also auto scaled depending on the traffic. Example customer references and samples available upon request.
Analytics
- Service usage metrics
- Yes
- Metrics types
- To be described within call-off SOW. However, aligned to industry standards for Automations (e.g. usage data, success rate, etc.).
- Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Luminai
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Other
- Other data at rest protection approach
- We use Render, which encrypts all sensitive data, both at rest and in transit. The underlying services automatically use industry standard AES-256 encryption for storage. All endpoints support TLS 1.2 and above for encryption in transit with an A+ grade from SSL Labs.
- Data sanitisation process
- No
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- We do not extract, use, store or retain any customer data.
- Data export formats
- Other
- Other data export formats
- Standard format
- Data import formats
- Other
- Other data import formats
- We do not import clients data
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- The Services will, subject to the exceptions provided within Enterprise agreement be available 99% of the time during any full calendar month (“Scheduled Availability”). Full SLA agreement available upon request.
- Approach to resilience
-
We have multiple checks in place to make our system resilient. We have authentication and authorization at every step.
We use Render as our cloud provider, that provides encryption at transit and rest.
Our Large Action Model (LAM) continuously learns and improves performance once live. The more the LAM runs, the more it adapts to changes in systems, and the better it performs. Leveraging machine learning, LAM is able to understand if the system has changed. In the event of system changes and functionality still supports achieving business intent, LAM can adapt and take that action. If the systems have changed dramatically, where business intent is no longer possible, LAM can detect the change, pause the workflow and ask for help.
Automations will not break when a website, application or system upgrades and changes -- LAM will adjust and self-sustain. - Outage reporting
- Outages are communicated over email or Slack. Customer's also have access to a reporting dashboard to view automation activity where outages would be displayed.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Other
- Other user authentication
-
We have firebase authentication checks both at client and server side.
We have logs to make sure unwanted foreign entities do not access our systems. - Access restrictions in management interfaces and support channels
- Only authorized administrators are permitted to create new user IDs, and may only do so upon receipt of a documented request from authorized parties. User provisioning requests must include approval from data owners or DigitalBrain Inc. management authorized to grant system access. Prior to account creation, administrators verify that the account does not violate any DigitalBrain Inc. security or system access control policies such as segregation of duties, fraud prevention measures, or access rights restrictions.
- Access restriction testing frequency
- At least once a year
- Management access authentication
- 2-factor authentication
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- Between 1 month and 6 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- Between 1 month and 6 months
- How long system logs are stored for
- Between 1 month and 6 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- BSI
- ISO/IEC 27001 accreditation date
- 14/04/2021
- What the ISO/IEC 27001 doesn’t cover
- NA
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
-
- SOC2 Type 2
- HIPAA Compliant
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- To be confirmed with Luminai
- Information security policies and processes
- Luminai use Vanta for security and monitoring purposes. Information Security Policy applies to the use of information, electronic and computing devices, and network resources to conduct Luminai business or interact with internal networks and business systems, whether owned or leased by Luminai, the employee, or a third party. Description of security policies available on request.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Changes to the organization, business processes, information processing facilities, production software and infrastructure, and systems that affect information security in the production environment and financial systems shall be tested, reviewed, and approved prior to production deployment. All significant changes to in-scope systems and networks must be documented.
Change management processes shall include:
Processes for planning and testing of changes, including remediation measures Documented managerial approval and authorization before proceeding with changes that may have a significant impact on information security, operations, or the production platform
Advance communication/warning of changes - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Information about technical vulnerabilities of information systems being used shall be obtained in a timely fashion, the organization's exposure to such vulnerabilities shall be evaluated, and appropriate measures taken to address the associated risk. Variety of methods used to obtain information about technical vulnerabilities, including vulnerability scanning,
Penetration tests, and testing shall be performed following major changes to production systems and software.
The Engineering department shall evaluate the severity of vulnerabilities identified from any source, and if it is determined to be a risk-relevant critical or high-risk vulnerability, a service ticket will be created. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
Anti-malware protections are utilized on all endpoints except for those running operating systems. The anti-malware protections utilized are capable of detecting all common forms of malicious threats and performing appropriate mitigation activity.
We scan files upon their introduction to systems, and continually scan files upon access, modification, or download. Anti-malware definition and engine updates are configured to be downloaded and installed automatically whenever new updates are available.
Our production systems are configured to monitor, log, and self-repair and/or alert on suspicious changes to critical system files where feasible.
Systems are investigated and remediated in accordance with the Incident Response Plan. - Incident management type
- Supplier-defined controls
- Incident management approach
-
Information security events or incidents, possible incidents, imminent incidents, unauthorized access, policy violation, security weakness, or suspicious activity, then they immediately report the information using one of the following communication channels:
both contacting Hitachi Digital Services and Email help@DigitalBrain Inc..com information or reports about the event or incident reporters should act as a good witness and behave as if they are reporting a crime. Reports should include specific details about what has been observed or discovered. A defined and documented process is available upon request.
Incident response plan available upon request.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Tackling economic inequalityTackling economic inequality
Hitachi has actively addressed workforce inequality, appointing Lorena Dellagiovanna as our first Chief Diversity Officer and board member in April 2021, alongside Claire Thomas as CDIO. Resulting Success: 1. Inclusive Recruitment and further Development Practices: We prioritise fair treatment and equal opportunities for contract workers, incorporating CV blind interviewing. Our self-directed DEI training platform including subjects of inclusive leadership, creating an inclusive culture, how to overcome bias and many other topics has boosted female and non-Japanese executives at Hitachi by 10%. Now Focusing on emerging talent, we sponsor the 'Festival of the Girl' in London. 2. Investment in Physical and Mental Health: We offer Financial Advice, Career Advice, and anonymous mental health support both internally, through our Mental Health First Aiders, and externally via Optum/MyHeathWebb. We have an Employee Assistance program that ensures employees, and their dependents have access to professional counselling should they require it. More widely, we implemented the Mental Health at Work commitment standards, tailored to the Hitachi workforce. We also have 4 dedicated sessions led by the Equality Institute on how to talk about gender identity, being an ally, using LGBTQ+ identity as a superpower and transgender 101. 3. Environmental Innovator: Hitachi aims to be an innovator, reducing carbon for governments, cities, and customers. The Environmental Vision emphasizes solving environmental issues for a higher quality of life and a sustainable society. Partnering with Rainforest Connection, Hitachi develops data-driven solutions to protect rainforests, combat illegal logging, and preserve biodiversity. As a Principal Partner of COP26, Hitachi contributed to decarbonization and climate action. Committed to a Net Zero society, Hitachi strengthens climate targets across the entire value chain by 2050. We were also key contributors at COP28. In conclusion, By implementing improvements and actively addressing inequality, Hitachi aims to create an inclusive and supportive work environment.
Pricing
- Price
- £530,000 a unit
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- Yes. We offer a 60-day proof of concept and validation period.