Infosys Limited

Robotic Process Automation

Infosys helps enterprises in accelerating their RPA journey. With over 150 clients, 2000+ RPA professionals, Infosys follows product agnostic approach and partners with all leading RPA vendors to offer the best in class automation solutions. From Advisory to implementation and Support, Infosys offers the best in class RPA Automation Services

Features

  • RPA Advisory Services
  • Automation Consulting Services including Use Case discovery and Implementation Roadmap
  • RPA Implementation Services
  • RPA Support Services
  • Bot Monitoring Services
  • Bot Hosting services cloud or on premise
  • Bot Migration Services

Benefits

  • Automate routine and mundane tasks
  • Utilize human workforce to do more critical tasks
  • Improved productivity and accuracy
  • Considerable reduction in cost

Pricing

£1100 per unit

  • Free trial available

Service documents

Framework

G-Cloud 11

Service ID

5 4 2 2 8 7 8 3 7 2 0 3 8 7 9

Contact

Infosys Limited

Manish Malhotra

+44 7958 024225

manish_malhotra@infosys.com

Service scope

Software add-on or extension
No
Cloud deployment model
Private cloud
Service constraints
There are no known constraints in selecting our service.
System requirements
  • Processor : x64 Server Based CPU with 8 Cores
  • RAM : 8 GB
  • Disk Space : 100 GB
  • Operating System : Microsoft Windows Server 2012 R2
  • Internet Information Services 7.5
  • Microsoft .NET 4.6.1
  • Microsoft SQL Server 2012 Enterprise or higher
  • MS Visual Studio 2015 and above in Dev env
  • Processor : Intel Core i5 2.6 GHz & 8GB RAM
  • Microsoft .NET 4.6 & MS Office 2016

User support

Email or online ticketing support
Yes, at extra cost
Support response times
The ticket response time depends on the SLA agreed as per the contract signed between both the parties. This usually varies from 4 business hours to 24 business hours.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AAA
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Onsite support
Support levels
Support levels are as defined by SLA
Support available to third parties
Yes

Onboarding and offboarding

Getting started
"User Manual
Training at extra cost"
Service documentation
Yes
Documentation formats
  • PDF
  • Other
Other documentation formats
  • MS Word
  • MS Excel
End-of-contract data extraction
We do not store any customer confidential and transaction data.
End-of-contract process
At the end of contract period, we would do detailed training / knowledge transfer to the team who would take this over from our team as a transition plan.

Using the service

Web browser interface
No
Application to install
No
Designed for use on mobile devices
No
Service interface
No
API
No
Customisation available
Yes
Description of customisation
The users can modify the business logic/ UI as per the business requirements by making changes to the services.

Scaling

Independence of resources
The solution architecture would be designed such that the infrastructure and the number of robots can be easily scaled up or scaled down according to the requirements.

Analytics

Service usage metrics
Yes
Metrics types
Reports are generated with metrices such as bot utilization, exceptions, decision outcomes, and volumes. All activities like bot Activities, handling times, interactions, source applications, exception stack and performance etc. are recorded and saved for reporting and insights.
Reporting types
  • Real-time dashboards
  • Regular reports

Resellers

Supplier type
Reseller providing extra support
Organisation whose services are being resold
BluePrism, UiPath, Automation Anywhere, Workfusion

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
In-house
Protecting data at rest
Physical access control, complying with SSAE-16 / ISAE 3402
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
We do not store any customer confidential and transaction data.
Data export formats
Other
Other data export formats
NA
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
Other
Other protection within supplier network
AssistEdge uses SSL (HTTPS) for all web requests. Data in transit is encrypted and communications happen over HTTPS. All traffic between the client and the solution platform is secured via HTTPS and supports integration with SSL/HTTPS protocol for ensuring encryption of data in motion

Availability and resilience

Guaranteed availability
Based on SLA definition
Approach to resilience
Infosys designs solutions to be resilient and scalable. Depending on the platform, it provides disaster recovery, high availability and fallback capabilities through additional app-servers, reporting servers and databases servers depending on the scale of deployment.
Outage reporting
Solution are integrated with client monitoring and Alert systems and operate in compliance with client enterprise governance standards

Identity and authentication

User authentication needed
Yes
User authentication
Username or password
Access restrictions in management interfaces and support channels
Access is restricted by defining roles and assigning users in admin console.
Access restriction testing frequency
At least once a year
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
You control when users can access audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
You control when users can access audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
Bureau Veritas Certification. ISO/IEC 27001:2013
ISO/IEC 27001 accreditation date
20/04/2017
What the ISO/IEC 27001 doesn’t cover
Our certification covers all aspects of information security management in development, customization, implementation and maintenance of software products as well as associated infrastructure including cloud, support services and enabling functions as per business requirements.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
As per Client's protocols

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
"Provides systematic approach to control life cycle of all changes, facilitating beneficial changes to be made with minimum disruption to IT services. Change Management offers ITIL-aligned processes for normal, standard, and emergency change types.
Normal change: Follows complete change lifecycle including peer or technical approval, management, Change Advisory Board (CAB) authorization before being implemented, reviewed, closed.
Standard change: Frequently implemented, repeatable implementation steps, low risk, proven history of success.
Emergency change: Covers fix on fail or retroactive situations where impact to service has been experienced or fail situations where the impact to service is imminent if action is not taken."
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
As per Client's protocols
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
As per Client's protocols
Incident management type
Supplier-defined controls
Incident management approach
Infosys has a comprehensive Security Incident Response and Management procedure, which describes the steps to be taken for reporting, isolating, handling incidents and learning from security incidents. All incidents are captured by, and, reported to, respective departments and are handled according to the nature of the incident. Infosys’ security framework is aligned with the ISO27001:2013 information security management standard. Infosys is ISO27001:2013 certified. The external surveillance audits for the same are conducted on an annual basis by an independent third party audit agency (Bureau Veritas Certification-BVC).

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
Yes
Connected networks
Other
Other public sector networks
Connection to any public network depends on the business needs.

Pricing

Price
£1100 per unit
Discount for educational organisations
No
Free trial available
Yes
Description of free trial
We will be happy to arrange a demo of the solution and also consider a use case for POC based on business requirements

Service documents

Return to top ↑