Intelligent Process Automation Services
Implementation of iris, integrated robotic intelligent system is an Enterprise Business Process as a Service (BPaaS) automation platform. Built using design thinking principles and Cognitive AI, the system automates data capture, business process and outcome services. Applicable for any ERP / CRM / Mailroom saving Opex with improved quality.
Features
- Network based business process automation workflow platform
- On-Cloud, On-Premise, hybrid on cloud deployment
- Supports distributed smart mailroom - Direct from customer/remote agent
- Audit Trail of robots and human analysts (Compliance)
- Auto management of inventory at batch level and transaction level
- 0-Touch Data capture for Searchable PDF
- Design studio for data capture amd workflow services
- Capture any PDF, Excel, EDI (Multi-source)
- Integration to OCR Tesseract, ABBYY (Remote server)
- Audit Trail of robots and human analysts (Compliance)
Benefits
- 80% Infra cost saving, 400% faster compared to RPA
- Set up and run any business process in 10 weeks
- Reuse existing assets by leveraging integration capabilities
- Generate output in multiple formats - CSV, JSON, API
- Multi-language support helps global scope of automation
- Assure Data Integrity through appropriate business process definition
Pricing
£0.50 to £0.80 a transaction
- Education pricing available
Service documents
Framework
G-Cloud 12
Service ID
1 6 5 1 3 2 0 1 4 8 6 7 4 5 9
Contact
Vidruma Technologies Ltd
Vishwanath Ganti
Telephone: 07939958332
Email: ganti@vidruma.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- Any ERP or CRM supporting REST APIs
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- None
- System requirements
-
- Industry standard OS
- Network bandwidth of atleast 5MBPS
User support
- Email or online ticketing support
- Yes, at extra cost
- Support response times
-
2 business days during weekdays depending on the issue
3 business days over weekends - User can manage status and priority of support tickets
- No
- Phone support
- No
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- L3 PLATFORM SUPPORT AVAILABLE. - Email or online ticketing support
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Online training at extra cost
- Service documentation
- Yes
- Documentation formats
- HTML
- End-of-contract data extraction
- Data is stored with the users. The application only uses in-process data generated for the processing and does not retain it once the processing done. There is no data retained.
- End-of-contract process
- The contract includes implementation and configuring the solution in the client environment
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari 9+
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Mobile uses a web interface and provides limited capabilities compared to the website
- Service interface
- No
- API
- Yes
- What users can and can't do using the API
- Use the API to exchange data bi-directionally
- API documentation
- Yes
- API documentation formats
- Other
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Define the business processes to be automated
Scaling
- Independence of resources
- The software is hosted as per the client's request and the client is responsible for ensuring the availability of adequate resources.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Processing outcome metrics. Exact variables depend on the process and nature of data involved
- Reporting types
-
- API access
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- Never
- Protecting data at rest
- Other
- Other data at rest protection approach
- Security is managed by the customer and not by us.
- Data sanitisation process
- No
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- Extract in the form of JSON/CSV
- Data export formats
-
- CSV
- Other
- Other data export formats
- JSON
- Data import formats
-
- CSV
- Other
- Other data import formats
- JSON
Data-in-transit protection
- Data protection between buyer and supplier networks
- Other
- Other protection between networks
- Data doesn't leave the network
- Data protection within supplier network
- Other
- Other protection within supplier network
- Data doesn't leave the network and the software is deployed in a client-controlled environment. The client is responsible for the security and integrity of the network.
Availability and resilience
- Guaranteed availability
- 99.99% availability. The solution is hosted in a client-managed environment and the software has no restrictions on availability and is dependent on the network and other infrastructure managed by the customer.
- Approach to resilience
- Not applicable to us.
- Outage reporting
- Not applicable. It is dependent on the client-managed environment.
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Other
- Other user authentication
- Client-managed authentication
- Access restrictions in management interfaces and support channels
- Only authorized users have access to the software
- Access restriction testing frequency
- At least once a year
- Management access authentication
- Other
- Description of management access authentication
- Client-managed authentication
Audit information for users
- Access to user activity audit information
- No audit information available
- Access to supplier activity audit information
- No audit information available
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- Managed by client and is not applicable to us.
- Information security policies and processes
- Follow client's Information Security policies
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Configuration management as defined by the Management from time to time. Changes are tested by a limited set of clients in other geographies prior to general availability.
- Vulnerability management type
- Undisclosed
- Vulnerability management approach
- Not applicable
- Protective monitoring type
- Undisclosed
- Protective monitoring approach
- Not applicable
- Incident management type
- Undisclosed
- Incident management approach
- Not applicable
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Pricing
- Price
- £0.50 to £0.80 a transaction
- Discount for educational organisations
- Yes
- Free trial available
- No