Procensol

Automation Anywhere A2019 (Solution Provider)

Procensol helps to modernise and automate business processes. Providing tangible business outcomes underpinned by proven low-code technologies, our Intelligent Automation solutions orchestrate a more efficient use of resources. People, technology, data, and digital workers, working in harmony, achieving more with less. Procensol has the expertise to accelerate your digital transformation.

Features

  • Web-based Interface
  • In-Product Learning
  • Easy Customisation
  • Universal Recorder
  • Inline Scripting
  • Infuse Bots with AI, ML, NLP, and more
  • Extensible Commands
  • Powerful Bot Code Management
  • Mobile Application support to monitor and manage on the Go.
  • Secure Credential Store

Benefits

  • Industry's first completely Web based RPA platform
  • Its cloud-based architecture gives A2019 unprecedented scalability and extensibility
  • Instant-on ease of use
  • Infused with Artificial intelligence (AI)
  • Bank grade Security Features - GDPR compliance ready features
  • Make on-demand decisions through mobile app
  • Bot Store - Downloading plug and play bots
  • Pluggable Architecture reduces Total Cost of Ownership
  • Cross platform support
  • Collaboration friendly interface

Pricing

£7,500 a licence a year

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at iain.macdonald@procensol.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 12

Service ID

8 6 3 6 8 4 8 4 5 3 1 9 2 7 4

Contact

Procensol Iain MacDonald
Telephone: 07826 866775
Email: iain.macdonald@procensol.com

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Bots can be built to interact with any software a human can use.
Cloud deployment model
  • Public cloud
  • Private cloud
Service constraints
No service constraints
System requirements
  • Supported web browser or mobile device
  • Access to internal applications and environments if applicable

User support

Email or online ticketing support
Email or online ticketing
Support response times
With "Standard" platform support, the response-time range is within one business hour for Priority 1 (critical) issues to within twelve business hours for Priority 4 (minor) issues. The term "business hours" refers to standard Product Support hours within the European Union (EU), which are 08:00 to 17:30, BST (British Summer Time), Monday through Friday, excluding public holidays. Premier platform support and application support is available by negotiation on a contract by contract basis.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Yes, at an extra cost
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
N/A
Web chat accessibility testing
N/A
Onsite support
Yes, at extra cost
Support levels
Our comprehensive services deliver maintenance, support and product updates. Platform support and health checks are provided by the vendor as an integral part of the software license cost, by extension, we offer our customers both a standard and tailored support level dependant on the customer requirements and products. Support is accessible via phone or e-mail, as well as over the web. In the United Kingdom, Standard Product Support hours are 08:00 to 17:30, BST (British Summer Time), Monday through Friday, excluding public holidays. Premier support includes 24-hour assistance for critical issues The dedicated support team operates in a “flat” organizational structure, whereby any engineer may assist any customer with any issue. Procensol will allocate a technical account manager who can manage the platform support provided through the vendor relationship in addition to any support add-on product agreed. Application support can be provided for additional cost by our "Procensol Pulse" offering and is a fully configurable service (SLA's, 24/7 availability, etc.) which is priced according to your specific requirements. At an additional cost, we can also provide technical assurance, health check advice, architectural services, and training and enablement of your internal team on an ad-hoc or call off basis.
Support available to third parties
No

Onboarding and offboarding

Getting started
We have automated processes to orchestrate the onboarding of new customers. From a "get-started" perspective, we offer implementation, training, enablement and post-implementation support services. Additionally, all hosting, infrastructure, and system management tasks in relation to the platform are managed by the vendor; this includes activities around platform (but not application) such as, but not limited to, administration, patch deployments, software upgrades, and backups. Procensol provides additional configuration services to customise your environment to your specific needs, we also work with your internal teams to establish relevant access to, or integrations with any on-premise client side elements.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
The Automation Anywhere Enterprise Cloud solution will keep customer data, configs (bots), IQ Bot data, and most logs for 30 days after the customer’s subscription ends. Log files will be deleted no later than 180 days after the customer’s subscription ends.

Although customers are ultimately responsible for exporting the necessary information prior to the termination date we are able to provide additional services to work with you, or third parties, to ensure a smooth transition.
End-of-contract process
At the end of the contract the software will cease to perform as the license will have expired. Should you wish to continue it’s a simple renewal process, if not you simply uninstall the software from the servers.
Upon termination of a supplier relationship, AAI shall return all customer content in its possession or will certify that all customer content has been securely destroyed.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install
Yes
Compatible operating systems
  • Linux or Unix
  • MacOS
  • Windows
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Mobile App has three features of Control Room:
• Gain unprecedented level of control over their digital workforce - Start, pause and stop bots anytime anywhere
• Make on-demand decisions - Access ROI and business performance in real-time
• Keep track of their bots on the go - Track bot activity and receive real-time customised notifications
Service interface
No
API
Yes
What users can and can't do using the API
The Automation Anywhere Enterprise Control Room provides various public APIs which allow user to customise business automation for third party applications. It enables the third party applications to consume RPA, orchestrate bots and manage the RPA data based on events.
Control Room offers the following APIs:
1. Authentication API
2. Bot Login Credentials API
3. Bot Deployment API
4. Export Import Bot API

Users can perform operations based on the above provided APIs. Also, by primarily leveraging .NET DLL integration users can build adapters or connectors.
API documentation
Yes
API documentation formats
Open API (also known as Swagger)
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Users can perform operations based on the above provided APIs. Also, by primarily leveraging .NET DLL integration users can build adapters or connectors.

Scaling

Independence of resources
Cloud-native microservices architecture.

Analytics

Service usage metrics
Yes
Metrics types
Control Room’s built-in interactive dashboards provide key metrics on active users having access to control room, register client systems, past bot failures, total digital workforce, their schedules and work queues in active mode.
Bot’s Dashboard provides operational analytics on Bots in your RPA platform. It provides details around Bots Heartbeat, The Status of MVP (Most Valuable Process) Bots, upcoming workloads and Top Failure reasons.

As a Control Room user with Dashboard view privileges, you can view and analyse Devices (Bot Runner machine) relevant data when Bots are deployed on those Devices.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Automation Anywhere RPA Platform

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Our customers can export data via standard functionality and reports, including the business logic of their applications and the data stored in the relational database.
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Automation Anywhere maintains emergency and contingency plans for the infrastructure in which Automation Anywhere information systems that process customer content are hosted.
Approach to resilience
"Automation Anywhere has a BCP Policy. The BCP Policy creates a framework to resume operations related to critical business processes in the event of disaster incidents (identified in threat analysis of the plan) resulting into outages considered as worst case scenarios.

The document includes detailed sections on Business Impact Analysis ('BIA'), Recovery Time Objective ('RTO'), Disaster Threat Analysis and Employee Safety Measures, Recovery Strategy and Procedures, Emergency Response Team ('ERTs'), Function Recovery Teams ('FRTs'), BCP Training, BCP Testing and BCP Governance and Maintenance.

The Disaster threats covered under this plan are broadly classified as follows:

• Environmental Disasters
• Organized and/or Deliberate Disruptions
• Loss of Utilities and Services
• Equipment or System failures"
Outage reporting
Automation Anywhere has a BCP Policy. The BCP Policy creates a framework to resume operations related to critical business processes in the event of disaster incidents (identified in threat analysis of the plan) resulting into outages considered as worst case scenarios.

Identity and authentication

User authentication needed
Yes
User authentication
Username or password
Access restrictions in management interfaces and support channels
Access is deny-all and allow by exception based on roles, domains as defined in role-based accessibility control (RBAC). RBAC model ensures each User has console-access, to view information or data that is relevant to the role assigned by the Control Room Administrator. User Roles and relevant privileges are assigned from the Security Console. The users have roles based on the role permission given by the admin.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
N/A
ISO/IEC 27001 accreditation date
N/A
What the ISO/IEC 27001 doesn’t cover
N/A
ISO 28000:2007 certification
No
CSA STAR certification
Yes
CSA STAR accreditation date
N/A
CSA STAR certification level
Level 1: CSA STAR Self-Assessment
What the CSA STAR doesn’t cover
Our cloud services partner Amazon AWS has CSA STAR certificate
PCI certification
No
Other security certifications
Yes
Any other security certifications
Service Organisation Controls (SOC) 2 Type II

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
We designed our Information Security Policy using NIST standards. The A2019 solution implements 41 security controls across seven Families as defined in NIST 800-53 Rev4 such as Access Control, Change Management, Development Configuration Management, Audit and Accountability, Identification and Authentication, Incident Response and Controlled Maintenance. These controls are spread across the Control Room, the Bot Creators and Bot Runners.
Information security policies and processes
The Cloud Security Alliance (CSA) uses the NIST model for cloud computing as its standard for defining cloud computing. Our solution's security architecture follows the NIST SP800-53 Rev4 Standard, the basis for HIPAA, FISMA and a common reference standard for security professionals. The Control Room, Bot Creators and Bot Runners implement 41 Technical Controls across seven NIST Control Families.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
All teams at Automation Anywhere follow Agile methodology for delivery and can respond swiftly and effectively to any change that the business demands. A change request works its way from various sources (customers, stakeholders, product vision etc.) to the product backlog as user stories from where the team can pick them up as a part of iterations. Hence Agile allows changes to happen on a regular basis – not as any special change event. The regular show and tell of the ongoing work keeps the stakeholders well informed and helps to make any course correction if required.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
A penetration test is scheduled immediately before and after each release.  Our engineering schedule includes plans to correct or mitigate any findings in a maintenance releases. In addition, we conduct vulnerability scans and also conduct static and dynamic analysis of our code using Veracode. We are Veracode Level - 5 Certified. Our customers conduct periodic vulnerability scans at a level of frequency dictated by their security policies and our policy is to correct Critical vulnerabilities within 30 days of detection.  Additionally, we have participated in independent penetration test conducted by our clients which have yielded no significant findings.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Bot Insight is natively embedded in Automation Anywhere’s RPA platform. It provides real-time business insights and digital workforce performance measurement by leveraging massive amounts of content-level and productivity data that the deployed bots generate, touch, interact with, and process.
Incident management type
Supplier-defined controls
Incident management approach
Incident Response: Automation Anywhere maintains an incident response program designed to contain, analyse, remediate, and communicate security and safety incidents impacting Automation Anywhere managed networks and/or systems or customer content.

Incident Notification: If Automation Anywhere determines that customer content within its control has been subject to a security incident, the customer will be notified under and pursuant to applicable law.

Incident Recording: Automation Anywhere maintains a record of known security incidents with a description of the incident, consequences of incident, name of the reporter, to whom the incident was reported, and the procedure for recovering data and services as applicable.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Pricing

Price
£7,500 a licence a year
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Free cloud instance can be provided for a limited period during which we can build and demonstrate a proof of concept solution.
Link to free trial
Procensol.com/automation-free-trial

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at iain.macdonald@procensol.com. Tell them what format you need. It will help if you say what assistive technology you use.