Vidruma Technologies Ltd

Intelligent Process Automation Services

Implementation of iris, integrated robotic intelligent system is an Enterprise Business Process as a Service (BPaaS) automation platform. Built using design thinking principles and Cognitive AI, the system automates data capture, business process and outcome services. Applicable for any ERP / CRM / Mailroom saving Opex with improved quality.


  • Network based business process automation workflow platform
  • On-Cloud, On-Premise, hybrid on cloud deployment
  • Supports distributed smart mailroom - Direct from customer/remote agent
  • Audit Trail of robots and human analysts (Compliance)
  • Auto management of inventory at batch level and transaction level
  • 0-Touch Data capture for Searchable PDF
  • Design studio for data capture amd workflow services
  • Capture any PDF, Excel, EDI (Multi-source)
  • Integration to OCR Tesseract, ABBYY (Remote server)
  • Audit Trail of robots and human analysts (Compliance)


  • 80% Infra cost saving, 400% faster compared to RPA
  • Set up and run any business process in 10 weeks
  • Reuse existing assets by leveraging integration capabilities
  • Generate output in multiple formats - CSV, JSON, API
  • Multi-language support helps global scope of automation
  • Assure Data Integrity through appropriate business process definition


£0.50 to £0.80 a transaction

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 12

Service ID

1 6 5 1 3 2 0 1 4 8 6 7 4 5 9


Vidruma Technologies Ltd Vishwanath Ganti
Telephone: 07939958332

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Any ERP or CRM supporting REST APIs
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints
System requirements
  • Industry standard OS
  • Network bandwidth of atleast 5MBPS

User support

Email or online ticketing support
Yes, at extra cost
Support response times
2 business days during weekdays depending on the issue
3 business days over weekends
User can manage status and priority of support tickets
Phone support
Web chat support
Onsite support
Yes, at extra cost
Support levels
L3 PLATFORM SUPPORT AVAILABLE. - Email or online ticketing support
Support available to third parties

Onboarding and offboarding

Getting started
Online training at extra cost
Service documentation
Documentation formats
End-of-contract data extraction
Data is stored with the users. The application only uses in-process data generated for the processing and does not retain it once the processing done. There is no data retained.
End-of-contract process
The contract includes implementation and configuring the solution in the client environment

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
Mobile uses a web interface and provides limited capabilities compared to the website
Service interface
What users can and can't do using the API
Use the API to exchange data bi-directionally
API documentation
API documentation formats
API sandbox or test environment
Customisation available
Description of customisation
Define the business processes to be automated


Independence of resources
The software is hosted as per the client's request and the client is responsible for ensuring the availability of adequate resources.


Service usage metrics
Metrics types
Processing outcome metrics. Exact variables depend on the process and nature of data involved
Reporting types
  • API access
  • Regular reports
  • Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
Protecting data at rest
Other data at rest protection approach
Security is managed by the customer and not by us.
Data sanitisation process
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Extract in the form of JSON/CSV
Data export formats
  • CSV
  • Other
Other data export formats
Data import formats
  • CSV
  • Other
Other data import formats

Data-in-transit protection

Data protection between buyer and supplier networks
Other protection between networks
Data doesn't leave the network
Data protection within supplier network
Other protection within supplier network
Data doesn't leave the network and the software is deployed in a client-controlled environment. The client is responsible for the security and integrity of the network.

Availability and resilience

Guaranteed availability
99.99% availability. The solution is hosted in a client-managed environment and the software has no restrictions on availability and is dependent on the network and other infrastructure managed by the customer.
Approach to resilience
Not applicable to us.
Outage reporting
Not applicable. It is dependent on the client-managed environment.

Identity and authentication

User authentication needed
User authentication
Other user authentication
Client-managed authentication
Access restrictions in management interfaces and support channels
Only authorized users have access to the software
Access restriction testing frequency
At least once a year
Management access authentication
Description of management access authentication
Client-managed authentication

Audit information for users

Access to user activity audit information
No audit information available
Access to supplier activity audit information
No audit information available
How long system logs are stored for

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance approach
Managed by client and is not applicable to us.
Information security policies and processes
Follow client's Information Security policies

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Configuration management as defined by the Management from time to time. Changes are tested by a limited set of clients in other geographies prior to general availability.
Vulnerability management type
Vulnerability management approach
Not applicable
Protective monitoring type
Protective monitoring approach
Not applicable
Incident management type
Incident management approach
Not applicable

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks


£0.50 to £0.80 a transaction
Discount for educational organisations
Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.