Skip to main content

Help us improve the Digital Marketplace - send your feedback

Cloud Logik Ltd.

Software As a Service

SaaS for:
- Process mining
- Quality management
- Performance management
- Business Process Management
- Enterprise Architecture
- Performance management
- Process improvement
- Process KPI Reporting
- Back office transformation
- Digital Transformation
- AI Process automation
- Conformance & variance analysis
- Digital twin

Features

  • Automate the as is discovery process
  • Identify dependency graphs & hand off points
  • Find bottlenecks and root cause analysis
  • Build insight driven dashboards
  • Perform conformance and variance analysis
  • Robotic Process Automation
  • Simultaneous modelling
  • Multilingual

Benefits

  • Establish intellectual ownership of your processes
  • Reduce risk
  • Improve the quality of process KPIs
  • Insight driven decision making
  • Efficiently allocate resources
  • Regulatory and Legal compliance
  • Increased transparency of operations and monitoring of the right KPIs
  • Model the to be processes

Pricing

£5,000 a unit

  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at max@cloudlogik.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

7 7 6 9 3 4 7 7 2 4 0 1 6 7 5

Contact

Cloud Logik Ltd. Max Lakanu
Telephone: 07751796707
Email: max@cloudlogik.co.uk

Service scope

Software add-on or extension
No
Cloud deployment model
Public cloud
Service constraints
Limited to Amazon Web Services (AWS) constraints
System requirements
Not applicable

User support

Email or online ticketing support
Email or online ticketing
Support response times
Platinum Service:
Severity 1 (core hours)
Time to respond: 30mins
Time to fix: 4hrs

Severity 2 (core hours)
Time to respond: 1hr
Time to fix: 8hrs

Severity 3 (core hours)
Time to respond: 2hrs
Time to fix: 16hrs

Severity 4 (core hours)
Time to respond: 4hrs
Time to fix: 40hrs
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Yes
Phone support availability
9 to 5 (UK time), 7 days a week
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), 7 days a week
Web chat support accessibility standard
WCAG 2.1 AA or EN 301 549
Web chat accessibility testing
How the keyboard focus moves
How the screen readers interpret pages
How does the page behaves with slow internet connections
How do people with learning and cognitive disabilities understand the page
Onsite support
Yes, at extra cost
Support levels
Platinum service starts at 20% of initial implementation cost
Gold service starts at 10% of initial implementation cost
Support available to third parties
Yes

Onboarding and offboarding

Getting started
As part of the service we are able to provide training: online, onsite or through our portal. In addition we are able to deliver accelerated training to ensure knowledge transfer is delivered iteratively through out the build-configure-test and deploy phases of the program
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Export is available as standard in the tool and can be performed by users
End-of-contract process
Our approach creates a digital twin of business processes driven by the in-scope systems. All dashboards, business processes flows in BPMN etc are available for export

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Apple iPad and iPhone with iOS 16 and Safari
Android version 11 or higher with Chrome for Android
Service interface
Yes
User support accessibility
None or don’t know
Description of service interface
Web based interface to ingest event logs, design the dashboards, automate business process discovery and optimisation.
Accessibility standards
None or don’t know
Description of accessibility
Web based
Accessibility testing
Not applicable
API
Yes
What users can and can't do using the API
PR ProcessAnalyzer API can be used to build integrations with other applications and automate operations in the process mining system.

QPR ProcessAnalyzer API is a JSON based API following the REST design principles. All methods (except the token and serverinfo) require a prior login to establish a session. The session is initialized with the token call with username and password, and the access token is returned as a response for a successful login. The methods requiring prior authenticated session, need to have a HTTP request header Authorization with value Bearer <access token> to identify the session.

In addition, there are methods for

moving and deleting workspace elements
projects
dashboards
models
datatables
scripts
users, groups and roles
API documentation
Yes
API documentation formats
  • HTML
  • PDF
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
QPR Process Analyzer the dashboards and charts are customisable

Scaling

Independence of resources
Cloud multi-tenant architecture

Analytics

Service usage metrics
Yes
Metrics types
System reporting
Time motion analysis, service optimisation, automation etc
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
QPR

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
European Economic Area (EEA)
User control over data storage and processing locations
No
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least every 6 months
Penetration testing approach
In-house
Protecting data at rest
  • Scale, obfuscating techniques, or data storage sharding
  • Other
Other data at rest protection approach
QPR ProcessAnalyzer API is a JSON based API following the REST design principles. All methods (except the token and serverinfo) require a prior login to establish a session.

All QPR solution data is stored in a MS SQL database which is encrypted at rest. Encryption uses the industry standard AES-256 encryption algorithm to encrypt QPR solution data.
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
The tool utilises imported system/transaction level event logs and where there is integration with systems these can be stopped. All data can be exported in CSV format and BPMN. Items can also be deleted (clicking the move to the recycle bin or delete forever button)
Data export formats
  • CSV
  • Other
Other data export formats
  • PNG
  • JPG
  • SVG
  • PDF
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
99.9% including scheduled maintenance windows
Approach to resilience
The architecture of our service is built to support high availability across availability zones
Outage reporting
Email alerts
Cloud monitoring and alerting

Identity and authentication

User authentication needed
Yes
User authentication
  • Username or password
  • Other
Other user authentication
All access requires a user account. Users needs to authenticate first to start a new session. Authentication can be performed by a password stored to QPR ProcessAnalyzer, or an external identity provider through SAML 2.0 protocol can be used. As a result of the successful authentication, the user gets a session token, that is stored in the user's web browser. Once the user is authenticated, all subsequent requests authenticate using the session token, which is included into each request as HTTP request header. If the session token is not valid, the request is rejected.
Access restrictions in management interfaces and support channels
Role based access for all components, interfaces and support channels
Access restriction testing frequency
At least every 6 months
Management access authentication
  • Username or password
  • Other
Description of management access authentication
Access requires a user account. Users needs to authenticate first to start a new session. Authentication can be performed by a password stored in the tool, or an external identity provider through SAML 2.0 protocol can be used. As a result of the successful authentication, the user gets a session token, that is stored in the user's web browser. Once the user is authenticated, all subsequent requests authenticate using the session token, which is included into each request as HTTP request header. The session token is then validated. If the session token is not valid, the request is rejected.

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
Third party
ISO/IEC 27001 accreditation date
2020
What the ISO/IEC 27001 doesn’t cover
N/A
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
No
Security governance certified
No
Security governance approach
AWS cloud based governance
Information security policies and processes
We have detailed information and security policy documents that are available on request

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Full release process, governed by DevOps practices with GITHub and cloud native configuration management tools
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
We test against OWASP top 10 and CWE top 25 and currently show no vulnerabilities. We deploy critical patches immediately to seven working days per standard release schedule
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
We use our configuration management and health check practices to identify deviations. Components in an error state from our health checks are immediately isolated and a new instance provisioned. This check runs hourly as part of our continuous performance management practices. In addition, as we are cloud native, all the components in our architecture are actively monitored and alerts are received on their status
Incident management type
Supplier-defined controls
Incident management approach
Our incident management processes are based on ITIL and defined in our Information Security Policy which is available on request

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

Equal opportunity

Equal opportunity

Cloud Logik is an Equal Opportunities employer. Our success is based on our ability to recruit, retain and advance the best people in order to meet the needs of the business in a highly competitive market.
We are committed to ensuring all partners, employees, associates and applicants receive fair and equitable treatment across all aspects of our policies and practices - including recruitment, selection, terms and conditions of employment, appraisal, promotion, remuneration, training and personal development. Cloud Logik provides guidance and support to engagement and line managers in relation to equality during recruitment and employment, where applicable.

The policy applies regardless of sex, gender reassignment, marital status, part-time status, sexual orientation, colour, race, nationality, national or ethnic origin, religion or creed, disability, responsibility for dependents, age and membership or non-membership of a trade union or political affiliation. Any breach, or alleged breach, of our policy is taken seriously, investigated fully - and anyone found to be in breach of the policy could be subject to disciplinary action. Cloud Logik requires all partners, employees and associates to act in accordance with the policy and to promote the spirit of it to the full.

Our objective is to ensure that all staff and job applicants receive fair and equitable treatment in all aspects of the Firm's personnel policies and practices, including recruitment and selection, terms and conditions of employment, pay and benefits, promotion and training. This applies regardless of gender, race, age, disability, colour, nationality, ethnic or national origin, marital status, sexual orientation, responsibility for dependants, religion or trade union membership.

Pricing

Price
£5,000 a unit
Discount for educational organisations
No
Free trial available
Yes
Description of free trial
QPR process analyser

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at max@cloudlogik.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.