Closed
Pega Robotics Differentiators
Kindly share inputs for differentiators
Show More
Kindly share inputs for differentiators
Blue Prism Ver (6.3) | Pega Robotics 8.0 | |
Bot Types | Supports only unattended automation | |
Licensing Model | More Flexible | |
Multi Tenancy | Added the multi-team environment feature in v6.3 which enables customers to create multiple teams with varying levels of permission and access to Processes, Objects and Resources |
|
Ease of Development | Lower as compared to UiPath & AA with no recording feature and | |
Security Features | BP scores slightly higher on this | |
Event Based Triggers | BP does not provide event based triggers. | |
Version Control Integration | No native integration with Third party tools. | |
Work Queues | Available since inception of Tool | |
MI Reports | Out of box reporting features available like reporting tables, scheduled job to populate schema with standard dashboard. | |
Cognitive Roadmap | BP is relying on external partnership like intelligent system and also offers VBO to integrate with Google, IBM Watson & Microsoft Cognitive services. | |
Windows 10 Support | •Fully Supported | |
Architecture | •Bot Exe interacts with App Server Exe through WCF (TCP/IP) protocol and .NET Remoting. | |
•All communication can be secured using certificate based authentication | ||
•App Server Connects to DB | ||
Code Files | •Source Code files stored in SQL DB | |
•Bot extracts code from DB while execution happens on Bot VM | ||
Configuration Management Integration | •Source Code stored in DB hence no out of Box integration with CM tools like SVN possible. | |
•Provides inbuilt version control mechanism which offers limited features. | ||
Credentials Vault | •Inbuilt credentials vault to store third party credentials encrypted using latest algorithm in file share. | |
Encryption Algorithms for storing Credentials | •Offers Multiple Encryption Algorithm. | |
•provision to utilize manual or automated generated Key. | ||
•Provision to store key manually and add custom Access restrictions. | ||
Communication | •Bots access credentials decrypted at App Server. | |
•Shared with client in plain text through secured channel (WCF using TCP\IP Protocol or .NET Remoting) | ||
CyberArk Integration | •Out of Box Cyber Ark Integration available | |
Work Queues | •Provision mechanism to utilize Encryption Algorithm to encrypt & store Work Queues items in databases. | |
Ability to Run Bots with locked Desktop | •Bots need to unlock desktop\VM, provides Log In Agent functionality to execute own its own. | |
Work Queues Supported | Work Queues available since inception of product | |
Item level Locking | Available | |
Defer Until / Postpone Item Processing | Available | |
Encryption of WQ items | Available | |
Tagging to filter items | Available | |
Retry Feature to process items marked as Exception | Available | |
Ability to Mark Exception Programmatically | Available | |
Filter Queues Programmatically | Available | |
Priority Assignment at Item level | Available |
Show Less