UST Global Pvt Ltd

UST SmartOps™

UST SmartOps™ is an Intelligent Process Automation Platform that holistically learns and re-imagines your business processes while digitizing and compressing manual workflows. This empowers employees to focus on opportunities with the highest business impact. Combines AI, RPA & cognitive automation to streamline business operations, reducing costs, improving efficiency and profitability.

Features

  • Centralises all operational activities
  • Knowledge management capabilities to reduce business processing time
  • Provides better insights for Issue identification & effective routing
  • Identifies potential issues that exceed standardized thresholds
  • Identifies issues and performs the corrective action without human intervention
  • Preempting issues by analyzing the performance and generate auto alerts

Benefits

  • Reduces turnaround time for completing a particular task
  • Accuracy in predicting the process trends
  • End to end automation can be achieved without human intervention
  • Gain agility, efficiency, cost savings with a digital command center
  • Reduces the incorrect denials and reminds to add missing details

Pricing

£500 to £2,500 a unit

  • Education pricing available

Service documents

Framework

G-Cloud 12

Service ID

7 0 1 4 0 2 9 3 7 3 5 5 8 7 3

Contact

UST Global Pvt Ltd Tanveer Mohammed
Telephone: 07769209245
Email: tanveer.aziz@ust-global.com

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
Service constraints
The offered service is supported on 16-Core/64GB, 32-Core/128GB and 4-Core/16GB VMs running on Ubuntu 18.04LTS. There could also be a need for GPU based VMs to meet specific peformance and volume SLAs.The platform is not automatically scalable. Based on the projected usage, the system configuration need to be set initally.
System requirements
  • 16vcpu - 64GB-512GBSSD (5 VMs)
  • 4vcpu - 16GB - 512GBSSD (1 VM)
  • 32vcpu - 128GB - 512GBSSD (1 VM)

User support

Email or online ticketing support
Yes, at extra cost
Support response times
This is SLA dependent and subject to discussions and requirements
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AAA
Phone support
Yes
Phone support availability
9 to 5 (UK time), 7 days a week
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
We have L1, L2 and L3 support levels and are finalized per the client requirements. Cost and resources are subject to discussions and are determined as per the client needs.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We offer customers with a blueprint containing the transformation approach to demonstrate the real savings by implementing a pilot process through UST SmartStart engagement. UST SmartStart is a 8 week strategic assessment for discovering the operational activities of an identifiedfunctional area.It typically comprises of 3 phases: Pre-Discovery, Discovery & Analysis and Finalise.
We grant user access to the platform using fine-grained permissions built on role-based access controls (RBAC). Customers can create multiple roles and assign roles to users based on their responsibilities. RBAC lets you control the way your users’ access, view and manage data. You can restrict the activities a user performs based on roles, user groups, credentials, devices and device groups and permissions and permission sets.
Online documentation and user manuals are available to help users to get started. Additional training requests can be considered on demand.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
UST SmartOps has no end user data stored.
End-of-contract process
Periodic notice are sent to customer of upcoming termination date and renewal options. End-of-contract process includes adequate transition and transfer activities based on customer needs.

Using the service

Web browser interface
Yes
Supported browsers
Chrome
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Mobile browsers can be used to access the application though there is no guarantee of optimal viewing experience.
Service interface
Yes
Description of service interface
Secure service interface is available for selected features of the platform.
Accessibility standards
None or don’t know
Description of accessibility
Service is available over web protected by various authentication measures.
Accessibility testing
N/A
API
Yes
What users can and can't do using the API
-Predict and integration APIs are made available over a secure API gateway.
-APIs are protected via authentication tokens.
-Machine Learning Model Training and Configuration data changes are not permitted via API interface.
API documentation
Yes
API documentation formats
PDF
API sandbox or test environment
No
Customisation available
Yes
Description of customisation
Users can customize the workflows and configurations associated with the product features. Customization can be done using the application interface. Designated personas are available for every feature to facilitate customization.

Scaling

Independence of resources
Every tenant will have their own individual environment and the application can dynamically scale as per demand.

Analytics

Service usage metrics
Yes
Metrics types
We provide a dashboard with Container and Node statistics
Reporting types
Real-time dashboards

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
Encryption of all physical media
Data sanitisation process
No
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Options to export data to excel formats for various features is available as a part of reporting and dashboards in UST SmartOps™ .
Data export formats
Other
Other data export formats
MS Excel format
Data import formats
Other
Other data import formats
  • MS Excel format
  • JSON format

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
UST SmartOps™ can be configured on High Availability based on business criticality requirements.
Approach to resilience
Information on resillience available on request.
Outage reporting
Real-time dashboard based reporting.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels
We grant user access to the the platform using fine-grained permissions built on role-based access controls (RBAC). Customers can create multiple roles and assign roles to users based on their responsibilities. RBAC lets you control the way your users’ access, view and manage data. You can restrict the activities a user performs based on roles, user groups, credentials, devices and device groups and permissions and
permission sets.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
Between 1 month and 6 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
Between 1 month and 6 months
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
Can be provided when requested
ISO/IEC 27001 accreditation date
Can be provided when requested
What the ISO/IEC 27001 doesn’t cover
Can be provided when requested
ISO 28000:2007 certification
Yes
Who accredited the ISO 28000:2007
Can be provided when requested
ISO 28000:2007 accreditation date
Can be provided when requested
What the ISO 28000:2007 doesn’t cover
Can be provided when requested
CSA STAR certification
No
PCI certification
Yes
Who accredited the PCI DSS certification
Can be provided when requested
PCI DSS accreditation date
Can be provided when requested
What the PCI DSS doesn’t cover
Can be provided when requested
Other security certifications
Yes
Any other security certifications
  • SOC-1 Type I
  • SOC-1 Type 2

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
UST follow a defined escalation and reporting approach. Full details can be supplied upon request

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Undisclosed. Information can be provided to individual customers under an NDA.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Undisclosed. Information can be provided to individual customers under an NDA.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Undisclosed. Information can be provided to individual customers under an NDA.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
ITOSM combines ITSM incident management processes with ITOM hybrid monitoring and intelligent correlation. ITOSM helps you conquer the chaos of multi-cloud management, with a single digital operations command center where you can proactively discover, monitor, manage, and remediate incidents without toggling between multiple consoles or struggling with disparate data sour.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Pricing

Price
£500 to £2,500 a unit
Discount for educational organisations
Yes
Free trial available
No

Service documents