Bots on the Prowl — Addressing Concerns of Application Owners.

  • Exploring alternate sources of data — Data sources from more robust applications that have multiple interfacing channels can be explored.
  • API and MQ Integration — With most applications having API endpoints or interfaces with messaging systems, bots can be integrated with those and avoid the UI access method.
  • Utilize RPA Products that are certified for compliance and security (Eg: Veracode, PCI)
  • Bots use industry standard password vaults
  • RPA program has a robust governance model and adheres to org’s data governance rules
  • Periodic audits/evaluation by organization’s Information security team on the RPA Product, technology landscape as well as RDLC process.
  • Centralized repository for Bot ID and entitlement management
  • Ability to handle Multi Factor Authentication

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store