FOUNDRY4 CONSULTING LIMITED

Automation Anywhere A2019 Enterprise on Cloud (Intelligent Automation / RPA)

Automation Anywhere's intelligent Digital Workforce platform provides RPA-as-a-Service as a turnkey automation solution for businesses of all sizes. It offers private, public, and hybrid cloud deployment. Near-infinite scalability enables the Digital Workforce to adapt as your business grows. Enterprise A2019 is infused with Artificial Intelligence capabilities to unlock process automation.

Features

  • Web-based Interface: Highly intuitive user experience on any device anywhere.
  • In-Product Learning: Tutorials allow building of bots with minimal training.
  • Easy Customization: Pluggable architecture allows for personalization of systems.
  • Universal Recorder: Single recorder captures and automates processes instantly.
  • Inline Scripting: Add Python and VBScript to create sophisticated bots.
  • AI, ML and NLP infusions: Create intelligent bots with plug-ins.
  • Extensible Commands: Grow your RPA toolset with application commands.
  • Bot Code Management: Allows debugging, version control and code merging.
  • Mobile Application support to monitor and manage on the Go.
  • Secure Credential Store: Passwords are encrypted and stored in databases.

Benefits

  • Industry's first web based RPA platform allows users simple automation.
  • Its cloud-based architecture gives A2019 unprecedented scalability and extensibility
  • Highly intuitive web-based interfaces simplify bot development, allowing business automation.
  • AI capabilities allows users to integrate third-party AI solutions.
  • Bank grade Security Features - GDPR compliance ready features.
  • Mobile app allows access to business performance in real-time.
  • Bot Store allows plug and play bots to reduce cost.
  • Pluggable Architecture reduces Total Cost of Ownership
  • Cross platform support removes need to install additional infrastructural components.
  • Collaboration friendly interface helps you to connect while you automate.

Pricing

£8,500 a unit

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at bids@human-plus.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 12

Service ID

2 3 3 7 1 4 5 1 0 1 1 4 5 0 9

Contact

FOUNDRY4 CONSULTING LIMITED David Biden
Telephone: 07716315194
Email: bids@human-plus.co.uk

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
Service constraints
No service constraints
System requirements
  • Intel i3 2.6 GHz 64-bit 4-GB RAM (for registered device)
  • 32GB storage; network 1 GbE
  • Bot agent is supported on all VMs where the supported...
  • Windows OS has been hosted on Version A2019.09 or later

User support

Email or online ticketing support
Yes, at extra cost
Support response times
Response Time is Based on Severity.

Severity 1: 3 hours
Severity 2: 1 business day
Severity 3: 2 business days
Severity 4: 5 business days
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
Web chat
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
Full details are on the support micro-site within the Automation Anywhere portal:
https://apeople.automationanywhere.com
Web chat accessibility testing
Automation Anywhere's Web Chat is a Bot and it creates a ticket on support portal which is picked up by a support engineer.
Onsite support
Onsite support
Support levels
Severity 1: Any AAI Product error in the live production environment (“Production”) that: a) renders the Product entirely unusable to you; b) occurred after the Product of the same version was running in Production without exhibiting such error; and c) has no identified alternate solution or workaround available.

Severity 2: Any AAI Product error in Production that: a) affects multiple users at the same time; b) has a critical business impact; c) occurred after the Product of the same version was running in Production without exhibiting such error and d) has no identified alternate solution or workaround available.

Severity 3: Any AAI Product error that: a) is causing a substantial business impact; and b) has no identified alternate solution or workaround available.

Severity 4: All other AAI Product errors as well as requests and questions. These include without limitation: a) requests for additional features and enhancements; b) Documentation related issues; and c) training related issues.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Automation Anywhere has a team of Customer Success Managers who are passionate about customer engagement and ensuring that they are happy with - Our Service, Our Attitude and Our Products. Also, once the sale is made, right from the onboarding process till the entire journey of the client with Automation Anywhere; it is CSM's responsibility to make them successful. In addition to that, they ensure that all the processes under customer success umbrella including support, product, sales etc. should be completed in a timely manner. We have highly skilled technical support staff who will help customer on new system improvements, new releases and products. We have separate training staff for especially training customer’s resources on our Product.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
The Automation Anywhere Enterprise Cloud solution will keep customer data, configs (bots), IQ Bot data, and most logs for 30 days after the customer’s subscription ends. Log files will be deleted no later than 180 days after the customer’s subscription ends.
End-of-contract process
At the end of the contract the software will cease to perform as the license will have expired. Should you wish to continue it’s a simple renewal process, if not you simply uninstall the software from the servers.
Upon termination of a supplier relationship, AAI shall return all customer content in its possession or will certify that all customer content has been securely destroyed.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install
Yes
Compatible operating systems
  • IOS
  • Linux or Unix
  • MacOS
  • Windows
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Mobile App has three features of Control Room:
• Gain unprecedented level of control over their digital workforce - Start, pause and stop bots anytime anywhere
• Make on-demand decisions - Access ROI and business performance in real-time
• Keep track of their bots on the go - Track bot activity and receive real-time customised notifications
Service interface
No
API
Yes
What users can and can't do using the API
The Automation Anywhere Enterprise Control Room provides various public APIs which allow user to customize business automation for third party applications. It enables the third party applications to consume RPA, orchestrate bots and manage the RPA data based on events.
Control Room offers the following APIs:
1. Authentication API
2. Bot Login Credentials API
3. Bot Deployment API
4. Export Import Bot API

Users can perform operations based on the above provided APIs. Also, by primarily leveraging .NET DLL integration users can build adapters or connectors.
API documentation
Yes
API documentation formats
PDF
API sandbox or test environment
Yes
Customisation available
No

Scaling

Independence of resources
Cloud-native microservices architecture etc.

Analytics

Service usage metrics
Yes
Metrics types
Control Room’s built-in interactive dashboards provide key metrics on active users having access to control room, register client systems, past bot failures, total digital workforce, their schedules and work queues in active mode.
Bot’s Dashboard provides operational analytics on Bots in your RPA platform. It provides details around Bots Heartbeat, The Status of MVP (Most Valuable Process) Bots, upcoming workloads and Top Failure reasons.

As a Control Room user with Dashboard view privileges, you can view and analyse Devices (Bot Runner machine) relevant data when Bots are deployed on those Devices. This data is presented in the form of widgets.
Reporting types
Real-time dashboards

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Automation Anywhere

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • EU-US Privacy Shield agreement locations
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least every 6 months
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Tools are available to help with data export.
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Automation Anywhere maintains emergency and contingency plans for the infrastructure in which Automation Anywhere information systems that process customer content are hosted.
Approach to resilience
Automation Anywhere has a BCP Policy. The BCP Policy creates a framework to resume operations related to critical business processes in the event of disaster incidents (identified in threat analysis of the plan) resulting into outages considered as worst case scenarios.

The document includes detailed sections on Business Impact Analysis ('BIA'), Recovery Time Objective ('RTO'), Disaster Threat Analysis and Employee Safety Measures, Recovery Strategy and Procedures, Emergency Response Team ('ERTs'), Function Recovery Teams ('FRTs'), BCP Training, BCP Testing and BCP Governance and Maintenance.

The Disaster threats covered under this plan are broadly classified as follows:

• Environmental Disasters
• Organized and/or Deliberate Disruptions
• Loss of Utilities and Services
• Equipment or System failures
Outage reporting
Automation Anywhere has a BCP Policy. The BCP Policy creates a framework to resume operations related to critical business processes in the event of disaster incidents (identified in threat analysis of the plan) resulting into outages considered as worst case scenarios.

Identity and authentication

User authentication needed
Yes
User authentication
Username or password
Access restrictions in management interfaces and support channels
Access is deny-all and allow by exception based on roles, domains as defined in role-based accessibility control (RBAC). RBAC model ensures each User has console-access, to view information or data that is relevant to the role assigned by the Control Room Administrator. User Roles and relevant privileges are assigned from the Security Console. The users have roles based on the role permission given by the admin.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
British Assessment Bureau
ISO/IEC 27001 accreditation date
19/02/2020
What the ISO/IEC 27001 doesn’t cover
All company activities are in scope
ISO 28000:2007 certification
No
CSA STAR certification
Yes
CSA STAR accreditation date
01/02/2020
CSA STAR certification level
Level 3: CSA STAR Certification
What the CSA STAR doesn’t cover
None
PCI certification
No
Other security certifications
Yes
Any other security certifications
SOC 2 type 1

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
We designed our Information Security Policy using NIST standards. The A2019 solution implements 41 security controls across seven Families as defined in NIST 800-53 Rev4 such as Access Control, Change Management, Development Configuration Management, Audit and Accountability, Identification and Authentication, Incident Response and Controlled Maintenance. These controls are spread across the Control Room, the Bot Creators and Bot Runners.
Information security policies and processes
The Cloud Security Alliance (CSA) uses the NIST model for cloud computing as its standard for defining cloud computing. Our solution's security architecture follows the NIST SP800-53 Rev4 Standard, the basis for HIPAA, FISMA and a common reference standard for security professionals. The Control Room, Bot Creators and Bot Runners implement 41 Technical Controls across seven NIST Control Families.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
All teams at Automation Anywhere follow Agile methodology for delivery and can respond swiftly and effectively to any change that the business demands. A change request works its way from various sources (customers, stakeholders, product vision etc.) to the product backlog as user stories from where the team can pick them up as a part of iterations. Hence Agile allows changes to happen on a regular basis – not as any special change event. The regular show and tell of the ongoing work keeps the stakeholders well informed and helps to make any course correction if required.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
A penetration test is scheduled immediately before and after each release.  Our engineering schedule includes plans to correct or mitigate any findings in a maintenance releases. In addition, we conduct vulnerability scans and also conduct static and dynamic analysis of our code using Veracode. We are Veracode Level - 5 Certified. Our customers conduct periodic vulnerability scans at a level of frequency dictated by their security policies and our policy is to correct Critical vulnerabilities within 30 days of detection.  Additionally, we have participated in independent penetration test conducted by our clients which have yielded no significant findings.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Bot Insight is natively embedded in Automation Anywhere’s RPA platform. It provides real-time business insights and digital workforce performance measurement by leveraging massive amounts of content-level and productivity data that the deployed bots generate, touch, interact with, and process.
Incident management type
Supplier-defined controls
Incident management approach
Automation Anywhere has formal reporting procedure exists, to report security incidents through appropriate management channels as per the prioritised backlog. The in-house reported defects are managed by the product team , the issues raised by the customers are routed by the Technical Support team and resolved as per severity and priority.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Pricing

Price
£8,500 a unit
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
For further details please visit: https://www.automationanywhere.com/products/community-edition
Link to free trial
https://www.automationanywhere.com/products/community-edition

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at bids@human-plus.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.