Experis Limited

Robotic Process Automation

We offer Robotic Process Automation solutions to enable our clients to build virtual workforces that are able to carry out repeatable activities. Our RPA Practice delivers rapid and cost-effective solutions to automation challenges around front office processes. Solutions are scalable and deliver significant reductions in time spent repeating tasks.

Features

  • Consulting Service
  • Development Service
  • Testing Service
  • Operational Support Service
  • Technology Neutral

Benefits

  • Lower operational costs
  • Carry out business tasks outside of normal working hours
  • Increase accuracy of repeatable tasks
  • Redirect human effort to higher value work
  • Maintain process continuity in conjunction with business changes
  • Flexible pricing models including Pay-as-you-go

Pricing

£300 per person

Service documents

G-Cloud 10

926756660468916

Experis Limited

James Cook

07515325519

james.cook@experis.co.uk

Service scope

Service scope
Software add-on or extension Yes, but can also be used as a standalone service
What software services is the service an extension to Wide ranging, can be applied to most application that run on Windows operating systems
Cloud deployment model Hybrid cloud
Service constraints Can require locally installed applications
System requirements
  • Windows operating systems
  • Access to source and destination applications or storage locations

User support

User support
Email or online ticketing support Email or online ticketing
Support response times This is dependent on agreed SLAs. An example would be within 1 hour 24/7 for a priority 1 incident
User can manage status and priority of support tickets Yes
Online ticketing support accessibility WCAG 2.0 AAA
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support Web chat
Web chat support availability 9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard WCAG 2.0 AAA
Web chat accessibility testing Several specifications in the Web Content Accessibility Guidelines (WCAG) 2.0.

Access to web chat support is provided via the support web portal. This supports the exchange of text between the contracted consumer of the service and a support representative.
Onsite support Onsite support
Support levels Dedicated Service Delivery Manager, Level 3 and Level 4 Support

Support costs - Designed per engagement depending on the scope of technologies and chosen architectures. Pricing is typically based on scale and volume required. This is bespoked for each requirement
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Online training and user documentation are supplied at no extra charge
Service documentation Yes
Documentation formats
  • HTML
  • ODF
  • PDF
End-of-contract data extraction In-Flight and historic data can be provided
End-of-contract process Arrangements for data provision and handover processes are made before the final month of the contract.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Access via mobile devices scales web version for appropriate screen and text size.
Accessibility standards WCAG 2.0 AAA
Accessibility testing Several specifications in the Web Content Accessibility Guidelines (WCAG) 2.0.

The service is accessible though web connected devices to view the status of any logged cases, their priority and any recent activity. Interaction is provided though the exchange of messages within each case.
API No
Customisation available Yes
Description of customisation Experis RPA solutions are fully customised and bespoked to individual automation challenges. The RPA practice delivers a comprehensive consultancy service through to testing and ongoing operational support.

Scaling

Scaling
Independence of resources Experis RPA solutions are fully scalable and can be used from SMB to Enterprise environments and they are not affected by the demand of other users onto the service.

Analytics

Analytics
Service usage metrics Yes
Metrics types Support performance against SLAs
Levels of traffic and data exchanged
Service availability metrics
Reporting types
  • Real-time dashboards
  • Regular reports

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency Never
Protecting data at rest Other
Other data at rest protection approach Not Applicable
Data sanitisation process Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach In-house destruction process

Data importing and exporting

Data importing and exporting
Data export approach From key data tables to flexible datasets.
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats XML
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats XML

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability Guaranteed availability to agreed SLAs
Approach to resilience Available on request
Outage reporting Outage reporting
• ITSM dashboard
• email alerts

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels Access is restricted by tenant, module and role using two-factor authentication.
Access restriction testing frequency At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach N/A
Information security policies and processes Cyber Essentials

Operational security

Operational security
Configuration and change management standard Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach Configuration and change management standard - Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402

Configuration and change management approach - Using ITIL-based Service Asset and Configuration Management via a fully-loaded Configuration Management Database, Standard, Non-Standard and Emergency Changes are processed electronically with associated Service Requests then applied from the Service Catalogue.
Vulnerability management type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach Vulnerability management type - Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402

Vulnerability management approach - Real-Time Event and Log Scanning is used to detect vulnerabilities which are passed to the designated Security Operations Centres. Patching can be instant or on-demand with threats being analysed from internal and external channels.
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach Protective monitoring type - Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402

Protective monitoring approach - Real-Time Event and Log Scanning is used to detect compromises which are passed to the designated Security Operations Centres. Incident and then Change Management can be instant or on-demand with associated Service Requests being executed instantly from the Service Catalogue
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach Incident management type - Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402

Incident management approach – Any logged incidents are passed to the designated teams. Incident and then Change Management can be instant or on-demand with associated Service Requests being executed instantly from the Service Catalogue. Users report Incidents via mobile devices or contact with the Service Desk. Reporting is supplied via a dedicated module to designated users or as a Service Request.

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £300 per person
Discount for educational organisations No
Free trial available Yes
Description of free trial Negotiable upon the scope of the engagement and service
Link to free trial TBC

Documents

Documents
Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑