Software As a Service
SaaS for:
- Process mining
- Quality management
- Performance management
- Business Process Management
- Enterprise Architecture
- Performance management
- Process improvement
- Process KPI Reporting
- Back office transformation
- Digital Transformation
- AI Process automation
- Conformance & variance analysis
- Digital twin
Features
- Automate the as is discovery process
- Identify dependency graphs & hand off points
- Find bottlenecks and root cause analysis
- Build insight driven dashboards
- Perform conformance and variance analysis
- Robotic Process Automation
- Simultaneous modelling
- Multilingual
Benefits
- Establish intellectual ownership of your processes
- Reduce risk
- Improve the quality of process KPIs
- Insight driven decision making
- Efficiently allocate resources
- Regulatory and Legal compliance
- Increased transparency of operations and monitoring of the right KPIs
- Model the to be processes
Pricing
£5,000 a unit
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
7 7 6 9 3 4 7 7 2 4 0 1 6 7 5
Contact
Cloud Logik Ltd.
Max Lakanu
Telephone: 07751796707
Email: max@cloudlogik.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- Limited to Amazon Web Services (AWS) constraints
- System requirements
- Not applicable
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Platinum Service:
Severity 1 (core hours)
Time to respond: 30mins
Time to fix: 4hrs
Severity 2 (core hours)
Time to respond: 1hr
Time to fix: 8hrs
Severity 3 (core hours)
Time to respond: 2hrs
Time to fix: 16hrs
Severity 4 (core hours)
Time to respond: 4hrs
Time to fix: 40hrs - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), 7 days a week
- Web chat support accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web chat accessibility testing
-
How the keyboard focus moves
How the screen readers interpret pages
How does the page behaves with slow internet connections
How do people with learning and cognitive disabilities understand the page - Onsite support
- Yes, at extra cost
- Support levels
-
Platinum service starts at 20% of initial implementation cost
Gold service starts at 10% of initial implementation cost - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- As part of the service we are able to provide training: online, onsite or through our portal. In addition we are able to deliver accelerated training to ensure knowledge transfer is delivered iteratively through out the build-configure-test and deploy phases of the program
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Export is available as standard in the tool and can be performed by users
- End-of-contract process
- Our approach creates a digital twin of business processes driven by the in-scope systems. All dashboards, business processes flows in BPMN etc are available for export
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
-
Apple iPad and iPhone with iOS 16 and Safari
Android version 11 or higher with Chrome for Android - Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- Web based interface to ingest event logs, design the dashboards, automate business process discovery and optimisation.
- Accessibility standards
- None or don’t know
- Description of accessibility
- Web based
- Accessibility testing
- Not applicable
- API
- Yes
- What users can and can't do using the API
-
PR ProcessAnalyzer API can be used to build integrations with other applications and automate operations in the process mining system.
QPR ProcessAnalyzer API is a JSON based API following the REST design principles. All methods (except the token and serverinfo) require a prior login to establish a session. The session is initialized with the token call with username and password, and the access token is returned as a response for a successful login. The methods requiring prior authenticated session, need to have a HTTP request header Authorization with value Bearer <access token> to identify the session.
In addition, there are methods for
moving and deleting workspace elements
projects
dashboards
models
datatables
scripts
users, groups and roles - API documentation
- Yes
- API documentation formats
-
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- QPR Process Analyzer the dashboards and charts are customisable
Scaling
- Independence of resources
- Cloud multi-tenant architecture
Analytics
- Service usage metrics
- Yes
- Metrics types
-
System reporting
Time motion analysis, service optimisation, automation etc - Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- QPR
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- European Economic Area (EEA)
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Scale, obfuscating techniques, or data storage sharding
- Other
- Other data at rest protection approach
-
QPR ProcessAnalyzer API is a JSON based API following the REST design principles. All methods (except the token and serverinfo) require a prior login to establish a session.
All QPR solution data is stored in a MS SQL database which is encrypted at rest. Encryption uses the industry standard AES-256 encryption algorithm to encrypt QPR solution data. - Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- The tool utilises imported system/transaction level event logs and where there is integration with systems these can be stopped. All data can be exported in CSV format and BPMN. Items can also be deleted (clicking the move to the recycle bin or delete forever button)
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- PNG
- JPG
- SVG
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- 99.9% including scheduled maintenance windows
- Approach to resilience
- The architecture of our service is built to support high availability across availability zones
- Outage reporting
-
Email alerts
Cloud monitoring and alerting
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Username or password
- Other
- Other user authentication
- All access requires a user account. Users needs to authenticate first to start a new session. Authentication can be performed by a password stored to QPR ProcessAnalyzer, or an external identity provider through SAML 2.0 protocol can be used. As a result of the successful authentication, the user gets a session token, that is stored in the user's web browser. Once the user is authenticated, all subsequent requests authenticate using the session token, which is included into each request as HTTP request header. If the session token is not valid, the request is rejected.
- Access restrictions in management interfaces and support channels
- Role based access for all components, interfaces and support channels
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- Username or password
- Other
- Description of management access authentication
- Access requires a user account. Users needs to authenticate first to start a new session. Authentication can be performed by a password stored in the tool, or an external identity provider through SAML 2.0 protocol can be used. As a result of the successful authentication, the user gets a session token, that is stored in the user's web browser. Once the user is authenticated, all subsequent requests authenticate using the session token, which is included into each request as HTTP request header. The session token is then validated. If the session token is not valid, the request is rejected.
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Third party
- ISO/IEC 27001 accreditation date
- 2020
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- No
- Security governance certified
- No
- Security governance approach
- AWS cloud based governance
- Information security policies and processes
- We have detailed information and security policy documents that are available on request
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Full release process, governed by DevOps practices with GITHub and cloud native configuration management tools
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- We test against OWASP top 10 and CWE top 25 and currently show no vulnerabilities. We deploy critical patches immediately to seven working days per standard release schedule
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- We use our configuration management and health check practices to identify deviations. Components in an error state from our health checks are immediately isolated and a new instance provisioned. This check runs hourly as part of our continuous performance management practices. In addition, as we are cloud native, all the components in our architecture are actively monitored and alerts are received on their status
- Incident management type
- Supplier-defined controls
- Incident management approach
- Our incident management processes are based on ITIL and defined in our Information Security Policy which is available on request
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Equal opportunityEqual opportunity
Cloud Logik is an Equal Opportunities employer. Our success is based on our ability to recruit, retain and advance the best people in order to meet the needs of the business in a highly competitive market.
We are committed to ensuring all partners, employees, associates and applicants receive fair and equitable treatment across all aspects of our policies and practices - including recruitment, selection, terms and conditions of employment, appraisal, promotion, remuneration, training and personal development. Cloud Logik provides guidance and support to engagement and line managers in relation to equality during recruitment and employment, where applicable.
The policy applies regardless of sex, gender reassignment, marital status, part-time status, sexual orientation, colour, race, nationality, national or ethnic origin, religion or creed, disability, responsibility for dependents, age and membership or non-membership of a trade union or political affiliation. Any breach, or alleged breach, of our policy is taken seriously, investigated fully - and anyone found to be in breach of the policy could be subject to disciplinary action. Cloud Logik requires all partners, employees and associates to act in accordance with the policy and to promote the spirit of it to the full.
Our objective is to ensure that all staff and job applicants receive fair and equitable treatment in all aspects of the Firm's personnel policies and practices, including recruitment and selection, terms and conditions of employment, pay and benefits, promotion and training. This applies regardless of gender, race, age, disability, colour, nationality, ethnic or national origin, marital status, sexual orientation, responsibility for dependants, religion or trade union membership.
Pricing
- Price
- £5,000 a unit
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- QPR process analyser