Skip to main content

Exela Technologies, Inc.

< Back to directory

Exela Technologies, Inc. ("Exela") is a location-agnostic global Business Process Automation ("BPA") leader combining industry-specific and multi-industry enterprise software and solutions with decades of experience. Exela is a leader in work flow automation, attended and un-attended cognitive automation, digital mail rooms, print communications, and payment processing with deployments across the globe.

Application Name: UiPath Platform
APPLICATION DESCRIPTION: The UiPath Platform is a state-of-the-art robotic software platform used by organizations across major industries to take over repetitive, rules-based administrative tasks and eradicate them from the activities of the human employees. The Platform is built on an open, extensible architecture and delivers enterprise wide automation benefits. It consists of the Studio - where users design their automation visually and without code, the Orchestrator - the aggregator where the entire robotic workforce is managed and monitored, the Driver responsible for the cognitive and computer vision capabilities, and the Robot - the attended and unattended software that takes over and executes all processes automatically.

Veracode Verified Continuous is the highest level of the Verified program and builds on the security processes embedded in the development life cycle from Verified Team to include the following security gates:

  • Integration of security tools into development workflows
  • Assessment of the application using an alternate technique (ex. dynamic analysis)
  • Documentation that the application does not include any Very High, High or Medium flaws
  • Completion of a bi-annual mitigation review
  • Documentation of a 30-day remediation deadline
  • Provide advanced training on secure coding for the security champion identified on the development team.
  • Provide development team with training on secure coding.

Learn more about the Veracode Verified program by clicking here.

Application Name: UiPath Cloud Platform
APPLICATION DESCRIPTION: The UiPath Cloud Platform enables immediate management of your robots, delivering easy scalability and high availability and reducing IT and infrastructure requirements. Start your proof of concept immediately and move to production in days through simple signup, easy deployment and updates of automations, with automatic license activation of Studio and Robots

Veracode Verified Continuous is the highest level of the Verified program and builds on the security processes embedded in the development life cycle from Verified Team to include the following security gates:

  • Integration of security tools into development workflows
  • Assessment of the application using an alternate technique (ex. dynamic analysis)
  • Documentation that the application does not include any Very High, High or Medium flaws
  • Completion of a bi-annual mitigation review
  • Documentation of a 30-day remediation deadline
  • Provide advanced training on secure coding for the security champion identified on the development team.
  • Provide development team with training on secure coding.

Learn more about the Veracode Verified program by clicking here.

Application Name: Box Office
APPLICATION DESCRIPTION:

BoxOffice gives you the power to aggregate, enhance, summarize and route your documents for real-time business intelligence and secure document archival.

Veracode Verified Standard represents that the following application security practices are embedded into the software development process:

  • Assessment of first-party code using static analysis
  • Documentation that the application does not allow Very High flaws in its first-party code
  • Developer access to remediation guidance Verified Standard is the first of three (3) tiers representing the Verified program.

Learn more about the Veracode Verified program by clicking here.

Application Name:

BEATS

APPLICATION DESCRIPTION:

BEATS™ is a collaborative and comprehensive business project management solution that connects all departments in an organization to manage opportunities , change requests and Projects through their entire life cycle.

Veracode Verified Standard represents that the following application security practices are embedded into the software development process:

  • Assessment of first-party code using static analysis
  • Documentation that the application does not allow Very High flaws in its first-party code
  • Developer access to remediation guidance Verified Standard is the first of three (3) tiers representing the Verified program.

Learn more about the Veracode Verified program by clicking here.

Application Name: PCH Global
APPLICATION DESCRIPTION:

PCH is Exela’s end-to-end insurance platform integrating disparate data systems to automate core processes and connect key stakeholders and workflows. PCH covers member enrollment, claims receipt, adjudication and processing, storage/archival, claims administration, claims policy management, communication services, payments and more. Intake methods include EDI, API, FTP, fax, email, web portal, desktop scanning, along with mobile device upload and a virtual printer feature (print to image). It will shorten claims processing times, reduce the cost of claims management, adapt to changing compliance requirements and be more responsive to policy holders.

Veracode Verified Standard represents that the following application security practices are embedded into the software development process:

  • Assessment of first-party code using static analysis
  • Documentation that the application does not allow Very High flaws in its first-party code
  • Developer access to remediation guidance Verified Standard is the first of three (3) tiers representing the Verified program.

Learn more about the Veracode Verified program by clicking here.

Application Name: Exela Banking Services
APPLICATION DESCRIPTION:

Exela Banking Services is a global payment and transaction management platform for cash management, payment processing, enterprise information sharing, and efficient and secure fund transfers with any payment media and between any country and any currency.

Veracode Verified Standard represents that the following application security practices are embedded into the software development process:

  • Assessment of first-party code using static analysis
  • Documentation that the application does not allow Very High flaws in its first-party code
  • Developer access to remediation guidance Verified Standard is the first of three (3) tiers representing the Verified program.

Learn more about the Veracode Verified program by clicking here.

Application Name: Exela Procure to Pay (Exela P2P)
APPLICATION DESCRIPTION:

Exela Procure to Pay provides a range of cloud-based Procurement to Payment services that allow organizations to connect, transact, collaborate, and manage their businesses in an easy and simple manner. Exela Procure to Pay offers complete Procure to Pay solutions – to manage Catalogs, Purchase Requests, Purchase Orders, Goods Receipts, Check Requests and Invoices. Accounts Payable Workflow with high degree of automation helps organizations reduce costs and errors and improve turnaround times.

Veracode Verified Standard represents that the following application security practices are embedded into the software development process:

  • Assessment of first-party code using static analysis
  • Documentation that the application does not allow Very High flaws in its first-party code
  • Developer access to remediation guidance Verified Standard is the first of three (3) tiers representing the Verified program.

Learn more about the Veracode Verified program by clicking here.

Application Name: DrySign
APPLICATION DESCRIPTION:

DrySign is a digital signature platform enabling quick and secure contract signing. The application allows users to sign documents electronically and also e-mail the documents for electronic signatures to one or more recipients. Documents signed by DrySign are legally binding.

Veracode Verified Standard represents that the following application security practices are embedded into the software development process:

  • Assessment of first-party code using static analysis
  • Documentation that the application does not allow Very High flaws in its first-party code
  • Developer access to remediation guidance Verified Standard is the first of three (3) tiers representing the Verified program.

Learn more about the Veracode Verified program by clicking here.

Application Name: eBPA
APPLICATION DESCRIPTION:

eBPA is Exela's RPA product that provides services for automating business processes graphically with Exela cognitive engines. Benefits include productivity improvements, efficiency gains and cost savings, quality, consistency and accuracy enhancements, customer experience, and employee empowerment. These benefits enable staff to think, create, and innovate.

Veracode Verified Standard represents that the following application security practices are embedded into the software development process:

  • Assessment of first-party code using static analysis
  • Documentation that the application does not allow Very High flaws in its first-party code
  • Developer access to remediation guidance Verified Standard is the first of three (3) tiers representing the Verified program.

Learn more about the Veracode Verified program by clicking here.

Application Name: Exela HCM
APPLICATION DESCRIPTION:

Exela’s HCM is online web application developed for HR functions. It is a one stop solution for all HR activities.

Veracode Verified Standard represents that the following application security practices are embedded into the software development process:

  • Assessment of first-party code using static analysis
  • Documentation that the application does not allow Very High flaws in its first-party code
  • Developer access to remediation guidance Verified Standard is the first of three (3) tiers representing the Verified program.

Learn more about the Veracode Verified program by clicking here.

Application Name: Genie
APPLICATION DESCRIPTION:

Genie is a desktop back ground application which was developed and owned by Exela. It’s used by management to monitor the machine usage, asset management, course / test mandates.

Veracode Verified Standard represents that the following application security practices are embedded into the software development process:

  • Assessment of first-party code using static analysis
  • Documentation that the application does not allow Very High flaws in its first-party code
  • Developer access to remediation guidance Verified Standard is the first of three (3) tiers representing the Verified program.

Learn more about the Veracode Verified program by clicking here.

Application Name: PCT
APPLICATION DESCRIPTION:

PCT is a customer interaction portal for Corporate Tax processing. The portal allows users to search, retrieve, and view Corporate Tax Return documents, as well as working the Verification Queues. PCT is the platform that is replacing FASTRIEVE and, eventually, tRex.

Veracode Verified Standard represents that the following application security practices are embedded into the software development process:

  • Assessment of first-party code using static analysis
  • Documentation that the application does not allow Very High flaws in its first-party code
  • Developer access to remediation guidance Verified Standard is the first of three (3) tiers representing the Verified program.

Learn more about the Veracode Verified program by clicking here.

Application Name: BancPay - Mobile
APPLICATION DESCRIPTION:

BancPay mobile application is created in order to manage the Invoices on the go. All the “Pending Approval” will display in the user’s hand-held device, which helps the user to take logical decisions.

Veracode Verified Standard represents that the following application security practices are embedded into the software development process:

  • Assessment of first-party code using static analysis
  • Documentation that the application does not allow Very High flaws in its first-party code
  • Developer access to remediation guidance Verified Standard is the first of three (3) tiers representing the Verified program.

Learn more about the Veracode Verified program by clicking here.

Application Name: PrintShop
APPLICATION DESCRIPTION:

PrintShop is a fully configurable web-based, job submission and print management platform that enables organizations to manage the intake and completion of print and fulfilment requests. PrintShop connects directly with on-site reprographics centres, Exela’s 6 off-site Print Centres, or another third party print facility of your choice where orders are fulfilled.

Veracode Verified Standard represents that the following application security practices are embedded into the software development process:

  • Assessment of first-party code using static analysis
  • Documentation that the application does not allow Very High flaws in its first-party code
  • Developer access to remediation guidance Verified Standard is the first of three (3) tiers representing the Verified program.

Learn more about the Veracode Verified program by clicking here.

Application Name: Athena
APPLICATION DESCRIPTION:

Athena helps to organize a company’s data and derive actionable intelligence for enhanced profitability and connectivity. Athena aggregates structured and unstructured disparate data in a method that quickly processes and deploys large datasets. This allows the system to instantly pull and interpret key information, which can then be formatted in one cohesive place.

Veracode Verified Standard represents that the following application security practices are embedded into the software development process:

  • Assessment of first-party code using static analysis
  • Documentation that the application does not allow Very High flaws in its first-party code
  • Developer access to remediation guidance Verified Standard is the first of three (3) tiers representing the Verified program.

Learn more about the Veracode Verified program by clicking here.

Application Name: Spring Benefits
APPLICATION DESCRIPTION:

As a multilevel SaaS platform Spring^®^ offers efficient process management from enrollment to claims. Spring provides a variety of features including plan comparison and selection, enrollment, payments, report generation, claim tracking, benefit coordination, and many others. These features combine to make the insurance process seamless and free from the hassle of communication hurdles.

Veracode Verified Standard represents that the following application security practices are embedded into the software development process:

  • Assessment of first-party code using static analysis
  • Documentation that the application does not allow Very High flaws in its first-party code
  • Developer access to remediation guidance Verified Standard is the first of three (3) tiers representing the Verified program.

Learn more about the Veracode Verified program by clicking here.

Application Name: Exela-Smart Office
APPLICATION DESCRIPTION:

A complete suite of office automation solutions – optimizing facility efficiency, and enhancing experiences.

Veracode Verified Standard represents that the following application security practices are embedded into the software development process:

  • Assessment of first-party code using static analysis
  • Documentation that the application does not allow Very High flaws in its first-party code
  • Developer access to remediation guidance Verified Standard is the first of three (3) tiers representing the Verified program.

Learn more about the Veracode Verified program by clicking here.

Application Name: TIMO
APPLICATION DESCRIPTION:

TIMO is an automated and customizable incident tracking system with a web interface. All communications and notification are tracked providing a complete audit trail of all service request activities. Comprehensive reporting provides an excellent means of monitoring and processing service calls effectively and efficiently. Ticket related APIs provides flexibility of integration with other Ticketing Systems

Veracode Verified Standard represents that the following application security practices are embedded into the software development process:

  • Assessment of first-party code using static analysis
  • Documentation that the application does not allow Very High flaws in its first-party code
  • Developer access to remediation guidance Verified Standard is the first of three (3) tiers representing the Verified program.

Learn more about the Veracode Verified program by clicking here.

Application Name: Farmers
APPLICATION DESCRIPTION:

The app automates the current manual process performed by the Agents, where in the agents used to physically collect the checks from end customers and deposit in the bank

Veracode Verified Standard represents that the following application security practices are embedded into the software development process:

  • Assessment of first-party code using static analysis
  • Documentation that the application does not allow Very High flaws in its first-party code
  • Developer access to remediation guidance Verified Standard is the first of three (3) tiers representing the Verified program.

Learn more about the Veracode Verified program by clicking here.

Application Name: O3
APPLICATION DESCRIPTION:

O3 is a web based collection system to manage first party and third party accounts. The Dashboards enable managers and users to view work in progress accounts, pending accounts, collection figures, collection goals.

Veracode Verified Standard represents that the following application security practices are embedded into the software development process:

  • Assessment of first-party code using static analysis
  • Documentation that the application does not allow Very High flaws in its first-party code
  • Developer access to remediation guidance Verified Standard is the first of three (3) tiers representing the Verified program.

Learn more about the Veracode Verified program by clicking here.


The Veracode Verified directory is an online platform that enables you to view a list of companies that are in the Verified program. The companies provide applications or solutions created by such third-party companies (“Third-Party Offerings”). The Third-Party Offering, and its associated content provided to you, is subject to a separate End User License Agreement (“EULA”) with the applicable licensor.

These are Offerings that are not owned, created, licensed, or sponsored by Veracode. Veracode does not assume any liability with any Third-Party Offering and is not responsible for the quality, accuracy or nature of the Third-Party Offering or its content. Nothing in any third-party EULA shall limit, impact or supersede any of these terms.