How DSPs can Improve Straight Through Processing Rate in RPA Implementations by up to 82%

Robotic Process Automation

Digital Service Providers (DSPs) today are well placed to take advantage of next-generation technologies like Robotic Process Automation (RPA), Machine Learning, and Artificial Intelligence. As most of the smart DSPs have already implemented RPA and have been using it for a while now, they consider RPA as a one-time solution and do not look further to improve the automation potential and straight-through processing (STP) rate. The estimated STP rate in any DSP’s process is 75-85%. However, the actual realization is 30-50% due to increasing fallouts in the automation process.

As per Deloitte’s ‘Untapped advantage in your digital workforce’ report, the strategic priority of the DSPs’ operation is to focus on continuous improvement. To improve the STP rate, they are exploring various improvement techniques like occasional and analytics-driven continuous improvement, but these methods are found to be ineffective to achieve the expected rate. Based on our engagements with various DSPs, the key factors for fallouts that impact the STP are listed below.

  • Data integrity issues
  • Inefficient human-bot engagement
  • Handwritten text in scanned documents
  • Non-digital inputs and low-quality images

Hence it is suggested to focus on an efficient continuous improvement strategy that could assist in identifying the automation inefficiencies, root causes of fallouts, and tracking of STP rate – all in an automated way. This article further elaborates on the strategy that can be adopted by the DSPs to move beyond RPA and greatly improve the STP rate. The three-step process that can help DSPs to reap more value from the existing RPA implementation and reduce fallouts is detailed below.

  1. Intelligent Root Cause Analysis (RCA)

The initial steps to improve the STP rate includes smart identification of possible causes behind the fallouts and investigation of the exception path to discover inefficiencies. To derive the possible causes for fallouts, it is suggested to perform an intelligent root cause analysis that involves the extraction of transactional and performance logs from the bot. This can be carried out efficiently with the help of the process mining tools. The analysis should also be capable of automatically identifying the major fallout reasons, with further drill-down options to showcase the root cause of each fallout and where the fallouts are happening.

  1. Automated handling of fallouts

Once the fallouts are identified, it is essential to handle them in a smarter way. There are different reasons for fallouts, out of which the top two sample scenarios and approaches for efficient handling are provided below.

Scenario 1: Fallouts triggered due to missing or invalid inputs

Each attended RPA bot comes with a license and DSPs could not utilize the bot to its full capacity, till the time it is stuck at one transaction. Attended bots also interrupt the automation process allowing the human to intercede and make decisions. Hence, in the event of a missing input field, interactive bot solutions can be leveraged to improve the collaboration between the human and digital workforce. This increases the STP rate by turning the attended fallout scenarios into unattended scenarios.

An interactive bot solution with a human-in-loop approach can help the DSPs to create dynamic web forms in real-time using a “no-code” RPA solution. It can also help in marking the process as suspended, and the suspended task resumes in any available bot and completes the processing rather than waiting for human intervention.

Fig 1. Interactive bot solution with human-in-loop

“Interactive Bot Solution with Human-in-loop approach helps to reduce the fallout handling time by 50%”

Scenario 2: Fallouts due to handwritten text and poor resolution images

Standard Optical Character Recognition (OCR) based approach possesses a serious challenge in extracting the handwritten and printed text with different font sizes and languages. This results in a high number of fallouts and the entire transaction end up being processed manually, which drastically impacts the STP rate. Hence it is recommended to integrate the RPA solution with Computer Vision, which can help in automatic processing of handwritten text and poor resolution images.

Recommendations to enhance RPA solution with Computer Vision (CV)

  • Improve accuracy while extracting content from poor resolution images and hand-written text by encapsulating CV. This enables auto-scaling, auto-detection of language, tag generation, and text extraction.
  • Leverage a reusable plug and play component for integrating computer vision API with any RPA tool, making it a no-code solution.

Fig 2.RPA solution integrated with “Computer Vision (CV) API”

“Integrating Computer Vision (CV) with RPA reduces the development effort drastically, by using a plug and play component”

  1. Customized Tracking of STP Rate

Even after achieving the desired STP rate, monitoring of the STP rate is recommended to mitigate the process changes and seasonal issues. The STP rate can be improved with the help of a continuous monitoring tool, which helps in validating the milestones and fallout percentage. Automated alert notification can be triggered from the tool to the process owners when the fallout percentage exceeds the provided limit. Also, it is suggested to define the objectives of each KPI, and continuously track the progress over time.

In Conclusion

By leveraging the three-step process explained in this article, DSPs can set up the stage for continuous improvement in the automated process. Thus, broadening the scope of process automation enables the DSPs to achieve continuous improvement, before embarking on the next phase of the RPA automation journey and helps to accelerate the STP Rate by up to 82%

By Rajesh Khanna

Louis
Real-time Enterprise Software Data Enterprise software startups are capitalizing on real-time data to continually improve revenue, costs, cash flow, marketing, and sales as their business grows. The majority of software startup CEOs spoken with have ...
Derrek Schutman
Implementing Digital Capabilities Successfully Building robust digital capabilities can deliver huge benefits to Digital Service Providers (DSPs). A recent TMForum survey shows that building digital capabilities (including digitization of customer experience and operations), is the ...
Gilad David Maayan
What Is SSPM? SaaS Security Posture Management (SSPM) is a set of security tools that an organization’s security team can use to gain visibility and manage security for their Software as a Service (SaaS) applications ...
The all-new Stellar Repair for MS SQL – an Efficient Tool to Fix SQL Database Corruption
Efficient Tool to Fix SQL Database Corruption SQL database corruption is not uncommon. There are many reasons for SQL database corruption, such as virus infection, bugs in the SQL Server, errors during updates, abrupt system ...
Gary Bernstein
Secure Remote Authentication When employees are working remotely, they need to be able to access company resources and applications just as if they were in the office. This means that remote authentication needs to be ...

SECURITY TRAINING

  • Isc2

    ISC2

    (ISC)² provides IT training, certifications, and exams that run online, on your premises, or in classrooms. Self-study resources are available. You can also train groups of 10 or more of your employees. If you want a job in cybersecurity, this is the route to take.

  • App Academy

    App Academy

    Immersive software engineering programs. No experience required. Pay $0 until you're hired. Join an online info session to learn more

  • Cybrary

    Cybrary

    CYBRARY Open source Cyber Security learning. Free for everyone, forever. The world's largest cyber security community. Cybrary provides free IT training and paid IT certificates. Courses for beginners, intermediates, and advanced users are available.

  • Plural Site

    Pluralsite

    Pluralsight provides online courses on popular programming languages and developer tools. Other courses cover fields such as IT security best practices, server infrastructure, and virtualization.