CONVEDO

convedo Intelligent Capture Cloud

The heart of the Intelligent Capture Cloud is IRISXtract. Delivering advanced intelligent capture for organising content, extracting data, and continuously learning from human input. The Intelligent Capture Cloud uses AI technologies focused on processing forms and unstructured documents and then passes data back to Blue Prism Workers for enterprise-driven actions.

Features

  • AI and machine learning from new document structures
  • Software as a Service to remove installation times and costs
  • Accurate data extraction from your documents
  • Convert unstructured data from invoices, forms, etc to actionable data
  • Deep insights on content extraction to measure KPIs
  • Digital workforce to enhance your capabilities in your organisation
  • Audit logs to ensure you are compliant

Benefits

  • Reduce operational costs by increasing reliability and quality
  • Scale faster by addressing changing needs as your organisation grows
  • Connect to the Intelligent Capture Cloud Instantly
  • Remain Future-Proof as new innovations from IRIS technology changes

Pricing

£0.03 to £0.50 per instance

  • Education pricing available
  • Free trial available

Service documents

Framework

G-Cloud 11

Service ID

5 6 9 9 5 2 2 5 0 7 6 8 1 9 7

Contact

CONVEDO

Sascha Cutura

020 7718 0183

sascha.cutura@convedo.com

Service scope

Software add-on or extension
Yes
What software services is the service an extension to
IRISXtract, Blue Prism
Cloud deployment model
Hybrid cloud
Service constraints
None
System requirements
None

User support

Email or online ticketing support
Email or online ticketing
Support response times
You can expect convedo to respond to you within 1 day, subject to contractual agreements. Support response times will be SLA agreed with the customer.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Onsite support
Support levels
We provide application support at three levels:
Level1 support: solving minor issues within an application

Level2 support: provide a resolution function and management of configurations

Level3 support: providing advanced technology diagnosis and resolution.

The cost of each level of support is subject to different parameters per contract; e.g. application size, support hours, scope etc.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
An on-boarding process is provided to ensure customers can get up and running promptly.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
Not applicable because data is not stored permanently on The Intelligent Capture Cloud
End-of-contract process
At the end of the contract, user access is terminated

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
No
Designed for use on mobile devices
No
Service interface
No
API
Yes
What users can and can't do using the API
The API will be set up by convedo developers.
API documentation
Yes
API documentation formats
PDF
API sandbox or test environment
No
Customisation available
Yes
Description of customisation
You can decide where the forms are stored for the access of the Intelligent Capture Cloud. You can customise the destination of outputs to systems or storage locations of your choosing.

Scaling

Independence of resources
Sufficient capacity is built into the service for a multitude of users to be accessing the service without impacting performance for other users. The system design allows rapid expansion of capacity as required. Capacity growth is based on demand, seamless expansion.

Analytics

Service usage metrics
Yes
Metrics types
Reports include various collations and filtered reports of documents processed, data extracted, searches, defined terms and source of content, etc.
Reporting types
Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Physical access control, complying with SSAE-16 / ISAE 3402
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Depending on the data being exported, users can export data via downloading the original documents provided or by exporting the HTML version into PDF or MS Word. Tasks, Notes, Searches and Analysis Tracks can be exported to .csv or .xls
Data export formats
  • CSV
  • Other
Data import formats
  • CSV
  • Other

Data-in-transit protection

Data protection between buyer and supplier networks
IPsec or TLS VPN gateway
Data protection within supplier network
IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
99.9% guaranteed uptime outside of planned improvements / upgrades
Approach to resilience
Additional information available on request
Outage reporting
Email alerts, An API

Identity and authentication

User authentication needed
Yes
User authentication
Username or password
Access restrictions in management interfaces and support channels
We restrict access with role based permission system.
Access restriction testing frequency
At least every 6 months
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users receive audit information on a regular basis
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
N/A
Information security policies and processes
Information on request

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Based on ITIL configuration and change management
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Conforms to a recognised standard,

Monthly industry standard vulnerability scanning. Annual external vulnerability scans. Results are collected, prioritized, and assigned to owners using the Common Vulnerability Scoring System.

All critical vulnerabilities via a vendor patch, remediation asap but not later than 30 days of identification and release of appropriate system/application patch.

All required system upgrades or patches, remediation within 90 days of their identification and the release of an appropriate system/application patch.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Conforms to a recognised standard.

These information are considered convedo Confidential. This can be discussed one to one with a prospective customer under a mutually signed NDA.
Incident management type
Supplier-defined controls
Incident management approach
Conforms to a recognised standards.

The processes and approach is considered convedo Confidential. This can be discussed one to one with a prospective customer under a mutually signed NDA.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Pricing

Price
£0.03 to £0.50 per instance
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Access is provided to a demonstration library or small customer library.
Virtual Training is provided.
Access is provided for 14 days
Additional information can be given on request

Service documents

Return to top ↑