Appian Platform Licenses Reseller
Yexle is an Appian licences reseller. Appian is an industry-leading modern 'low-code' automation platform that helps businesses manage their operations, case management, and customers more effectively via streamline processes built on the Appian platform.
Features
- Real time data and process reporting.
- Process optimisation with Process Mining.
- Workflow and Process Management.
- AI analysis across Data and Processes.
- Low Code Development Platform.
- External facing web portals for external user interaction.
- Web and Mobile enabled platform.
- Centralise data without data migration with DataFabric.
- Integrate systems with built-in Integration Library and enhanced API connectors.
Benefits
- Faster time to develop and go-live with LowCode development.
- No heavy data migrations needed with DataFabric.
- Visualise multiple data sources in one environment with DataFabric.
- Connect legacy (none API) systems with RPA.
- Build once, available across web, mobile and tablet instantly.
- Question data and process in realtime with AI data analysis.
- Design process and workflow that match your exact needs.
- View data and process reports that are always upto date.
Pricing
£0.78 to £72.00 a licence a year
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
7 0 0 4 3 2 5 4 8 0 4 3 0 5 5
Contact
Yexle Limited
Vijay Poondy
Telephone: 07437466611
Email: vijay@yexle.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- Appian is a unified LowCode platform combining, everything you need to bring data together, configure applications, test and deploy them. It is not a high code (python, Java etc) platform for application development.
- System requirements
- No prior requirements required.
User support
- Email or online ticketing support
- Yes, at extra cost
- Support response times
- We provide application support that can include 24/7, 365 days a year support. Our response times can be as low as 10minutes depending on the agreement.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- No
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- We provide application support at three levels: Level1 support :provides resolution to minor issues within an application. Level2 support: provides a secondary resolution function and management of solution configuration. Level3 support:provides advanced technology diagnosis and resolution Depending on the number of applications and depending on the volume of incidents, Yexle also provides a Support Manager to oversee the provide support.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Once an Appian application has been configured, end user training can be provided both on-site, online through channels such as video conferencing as well as written documentation and in app training videos. Appian platform training can be done free via the Appian website where Appian provide a comprehensive training suit for both Administrators and application configurators.
The duration of the training and channel of instruction can be mutually agreed upon. A user manual as part of our service can also be provided which outlines the usage of application for various application user groups with various roles and rights - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Users can export their data (entirely or filtered version based on parameters) into CSV/Excel file formats from the application using OOTB or configured extraction routines. Yexle can also create bulk data extraction services if required to provide full extract of live as well as historical data from the application into staging database tables or CSV or Excel file formats. This data can then be imported into any other application.
- End-of-contract process
- The original contract does not include decommissioning of the application. As the amount of data to be extracted could potentially increase with time, an assessment must be conducted to calculate the effort required for data extraction and decommissioning. Accordingly the cost of extraction and decommissioning is ascertained and mutually agreed
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Appian uses in-built technology that makes it available across browser (computer and mobile) as well as a native mobile app without any rebuild or extra configuration. Once the application has been configured and deployed it's instantly available across these devices.
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 A
- Description of service interface
- Appian provides a URL through which users can log in. System automatically authorises and authenticates the users based on their roles, rights and provides necessary accesses to applications and options
- Accessibility standards
- WCAG 2.1 A
- Accessibility testing
- Yexle tests Appian applications for accessibility using assistive /automated technologies through Selenium, Cucumber, FitNesse.
- API
- Yes
- What users can and can't do using the API
- Appian can be used to ingest and showcase data from other system as well as make data available to other systems through APIs (SOAP and REST calls).
- API documentation
- Yes
- API documentation formats
-
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- All aspects the make up an application in Appian can be configured to meet the businesses requirements, i.e user interfaces, process flows, business rules, data and process auditing. Users have a drag-and-drop interface to configure their applications. Security levels can be setup to allow varying levels of access for applicant administration and configuration.
Scaling
- Independence of resources
- Prior to implementing the application, Yexle will agree with the customer on baseline non-functional requirements (like no. of concurrent users, avg request per user, size of request, hardware the platform is install on etc) which will help determine scalability. Though the iBPM platform(s) that we work with go beyond linear scalability, we can establish the thresholds (min, max and alert levels) through testing. Once the alert level thresholds are reached, we can have manual or automatic processes by which system resources are freed up to ensure that users do not face any performance lags, bottle necks or non-responsive situations
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Service Metrics: Memory, Number of active instances.
Other metrics: Case related metrics, Application SLA related metrics User Performance / Statistics, Process metrics and data, BAM reports - Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Appian (www.appian.com)
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Application specific data cannot be exported without the users / usergroups having the appropriate access rights and within EU restrictions. Exports to other systems / application can also be allowed based on business requirements. Data can be exported in various formats like XMLs, HTMLs, CSVs, PDFs or any user/business defined formats
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- XML
- Plain Text
- Excel
- JSON / Open data protocol
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- XML
- Excel
- JSON
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- For customers that are running mission critical applications on Appian Cloud that require a guaranteed Recovery Point Objective (RPO) and Recovery Time Objective (RTO), Appian Cloud offers High Availability as an add-on for customers. With High Availability, Appian Cloud is provided via three Availability Zones without a single point of failure. To achieve this, Appian uses servers and storage that are kept up-to-date with customer data and applications. For this High Availability offering, Appian offers a RPO of 1 minute, as well as an RTO of 15 minutes
- Approach to resilience
- Available on request
- Outage reporting
- Outages shall be reported through online dashboards and Incident Communication Report.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
- Other
- Other user authentication
-
LDAP
SSO - Access restrictions in management interfaces and support channels
- Access restriction is achieved through creation of Access Groups. Each user is associated to one or more access groups. The access group with a user helps in defining the accessibility roles (such as department role, Support role, manager role, admin role etc the user can take within the application) , rights (such as read, write, delete) and privileges (to add other users or update users etc) of the user to different sites and portals within an application or an enterprise.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
- Other
- Description of management access authentication
-
LDAP
SSO
Audit information for users
- Access to user activity audit information
- You control when users can access audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- You control when users can access audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- ISO/IEC 27001
- Other
- Other security governance standards
- Cyber Essentials Plus
- Information security policies and processes
-
ISO/IEC 27001:2013
ISO 27017:2015
ISO 27018:2019
ISO 9001:2015
Cyber essentials Plus
SOC 1 / ISAE 3402
SOC 2
SOC 3
PCI-DSS
HIPAA
FEDRAMP
DISA Impact Level 2 (IL2)
DISA Impact Level 4 (IL4)
DISA Impact Level 5 (IL5)
FISMA
GxP
FDA
508 / VPAT
Cloud Security Alliance
Health Information Trust Alliance (HITRUST)
Infosec Registered Assessors Program (IRAP)
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Available on request
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Available on request.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Available on request.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Available on request
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Equal opportunityEqual opportunity
As an organization, we have been constantly improving by providing equal opportunity to employees who are hired, promoted, and compensated based on their skills and experience, regardless of factors like race, gender, age, or disability. Yexle has been highlighted as a "Great Place to Work" and is in the top 10 for "Woman Great Place To Work India", 48% of Yexle's global workforce is female.
Pricing
- Price
- £0.78 to £72.00 a licence a year
- Discount for educational organisations
- Yes
- Free trial available
- No