Developer at a tech consulting company with 51-200 employees
Real User
Top 10
2023-08-02T01:42:44Z
Aug 2, 2023
Hello @Avigayil Henderson , first let me explain that the log implementation is a plus across the organization. In fact, let's talk about only for log automation process. Imagine for a while you have the capability to know what's happening with every bot or application right now, so you have many opportunities to implement a great transversal solution. For example if you use UiPath you could write an understandable message on Orchestrator and the EventViever write a technical detail message of your windows or if you want to. But if you want to create a more sophisticated and organized and cross platform functional you need to think perhaps something like this: you need implement a DB Model that satisfies the requirements (Project, ProjectType, ProjectArea, MasterLog and DetailLog tables). The Project table stores the project type, project area and details of the project plus using a state. The MasterLog stores the project you want to store, the state of the log project (enabled or disabled), and the user-friendly message. The DetailLog stores the technical message obviously the datetime that it's occurred. Remember the all tables needs to use audit fields (lot of fields). By other way you need to expose the APIs to lets the applications to write on it. Don't forget to secure the use of the APIs using for example OTP (JWT). This is a brief (high level) idea that you should implement. I hope this helps!
Search for a product comparison in Robotic Process Automation (RPA)
There are all kinds of compliance requirements out there, so you're posing a pretty broad question, but generally speaking, security compliance requirements are going to involve continuous monitoring, access management, encryption, endpoint and network security, and patch management.
It's going to come down to a log management solution, many of which provide reports that help you prove compliance. But because compliance usually has governance requirements, meaning that upper management is aware of risk issues and can provide proper direction, your log management solution needs to be able to present the technical details in a way that is meaningful to potentially non-technical people. So it's important to vet the solutions well, so that you know they work for your environment and your C-suite.
There are also compliance consultants who can bring expertise to the table. And if you're not sure where to begin, consider implementing a risk assessment so that you know what areas are most applicable to your business.
Technical Consultant/Team Lead at a tech services company with 51-200 employees
Jul 13, 2023
Hi,
It would be wrong to make a sectoral distinction.
I recommend that you research the following products.
1. Automation Anywhere
2. UIPath
3. IBM RPA
You won't find enough security in other solutions.
Blueprism Architect at a tech services company with 51-200 employees
Jul 13, 2023
In your case I recommend Power Automate. Why?
- The license is cheaper
- You have integration with many marketing services
- You can create cloud flows so that interactions with the APIs of the different services are executed. This prevents you from needing a physical machine reducing the cost.
- It has many triggers to launch automations, for example when receiving an email or if the service they use has a trigger, they can launch that automation
Hi peers,
I work for a mortgage company and am researching RPA solutions.
Can RPA interface with any application? Can we use APIs?
Thank you for your help.
User at a tech services company with 11-50 employees
Apr 10, 2023
We use UiPath and Microsoft Power Automate. Both of them work well for integration with most web/desktop applications. MSFT Power Automate has many ready connectors for a lot of applications to help with API integrations. Contact us if you need help with implementing the RPA solution. Mail ID: jo@neelitech.com. Website: www.neelitech.com
Yes. All well-known RPA products can interface with applications using exposed APIs. If not API, then via desktop automation for Web/Desktop applications. In some cases, you may have to use Java Access Bridge.
However, if it's a mainframe AS/400-based application, I have a faster and better solution using API.
Dear PeerSpot community members,
Welcome to the latest PeerSpot Community Spotlight, where we sum up the most relevant recent postings by your peers in the community.
Check out the latest questions, articles and professional discussions contributed by PeerSpot community members!
Trending
Here are some topics that your peers are discussing at the moment:
What is your recomme...
Dear PeerSpot community members,
This is our latest Community Spotlight for YOU. Here we've summarized and selected the latest posts (professional questions, articles and discussions) contributed by PeerSpot community members.
Check them out!
Trending
See what your peers are discussing at the moment!
What were your main pain points during the SIEM product purchase process?
What...
Hi PeerSpot community members,
This is a fresh-from-the-oven Community Spotlight for you. Here, we've summarized and selected the latest posts (professional questions, articles and discussions) by PeerSpot community members. Check them out!
Also, please share with us your feedback and suggestions by commenting below!
Trending
See what is trending at the moment and chime in to discuss!
...
Hi peers,
We're happy to share our new bi-weekly Community Spotlight with you. Here you'll find recent contributions by PeerSpot community members: questions, articles and trending discussions.
Trending
See what your peers are discussing at the moment!
What to choose: an endpoint antivirus, an EDR solution, or both?
What is your recommended IT Service Management (ITSM) tool in 2022?
W...
All companies, from large to small, are trying to keep one end of the digital transformation, but for large companies, the situation is more than opening a social media account.
Sometimes they may have to manage millions of data. And the faster they do these transactions, the more they get ahead of the competition.
Although RPA is a well-known tool in digital transformation in the world, it...
Hello @Avigayil Henderson , first let me explain that the log implementation is a plus across the organization. In fact, let's talk about only for log automation process. Imagine for a while you have the capability to know what's happening with every bot or application right now, so you have many opportunities to implement a great transversal solution. For example if you use UiPath you could write an understandable message on Orchestrator and the EventViever write a technical detail message of your windows or if you want to. But if you want to create a more sophisticated and organized and cross platform functional you need to think perhaps something like this: you need implement a DB Model that satisfies the requirements (Project, ProjectType, ProjectArea, MasterLog and DetailLog tables). The Project table stores the project type, project area and details of the project plus using a state. The MasterLog stores the project you want to store, the state of the log project (enabled or disabled), and the user-friendly message. The DetailLog stores the technical message obviously the datetime that it's occurred. Remember the all tables needs to use audit fields (lot of fields). By other way you need to expose the APIs to lets the applications to write on it. Don't forget to secure the use of the APIs using for example OTP (JWT). This is a brief (high level) idea that you should implement. I hope this helps!
There are all kinds of compliance requirements out there, so you're posing a pretty broad question, but generally speaking, security compliance requirements are going to involve continuous monitoring, access management, encryption, endpoint and network security, and patch management.
It's going to come down to a log management solution, many of which provide reports that help you prove compliance. But because compliance usually has governance requirements, meaning that upper management is aware of risk issues and can provide proper direction, your log management solution needs to be able to present the technical details in a way that is meaningful to potentially non-technical people. So it's important to vet the solutions well, so that you know they work for your environment and your C-suite.
There are also compliance consultants who can bring expertise to the table. And if you're not sure where to begin, consider implementing a risk assessment so that you know what areas are most applicable to your business.