Integra Finance Management and Procurement
Integra is a fully integrated finance management solution, built upon a suite of best practice, business-process orientated software modules and configurable workflow to deliver digital transformation and improved business intelligence. Scalable through the cloud platform and module selection, the solution can be tailored to align to specific customer requirements.
Features
- Proprietary IBSS Finance solution, full development, delivery and support
- Leading industry technology platform with comprehensive, fully integrated modular solution
- Complete control and analysis across your finance and procurement operations
- Comprehensive Business Intelligence and reporting suite
- Simple to use, user-defined graphical dashboard reporting, with transaction drill-down
- Definable multi-level workflow, delivering consistent, best practice business processes
- Definable scheduled automation deployment
- Secure, Cloud-hosted access anywhere for full multi-platform remote working
- Established, proven implementation method, enables seamless transition into operational service
- Access to Integra user group and sector-specific special interest groups
Benefits
- Consistent easy-to-use user interface across the end-to-end solution
- Advanced business analytics to better inform decision-making and future planning
- Scalable platform, allowing flexibility aligned to changes in your organisation
- Delivers continuous improvement of operational efficiency, reducing TCO
- Delivers single version of the truth, driving increased accountability
- Simple, seamless integration to third party systems to maximise ROI
- Templated solutions to enable accelerated deployment
- Interoperable, enabling unified Finance solutions platform across your organisation
- Long-standing heritage, consistently proven to enable customer outcomes
- Flexibility assuring ‘fit-for-future’ service and informing Integra strategic direction
Pricing
£46,344.98 a unit a year
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
1 1 5 5 7 8 7 6 0 7 5 4 4 6 9
Contact
INTEGRATED BUSINESS SOFTWARE AND SOLUTIONS LIMITED
Justin Taylor
Telephone: 07966199181
Email: justin.taylor@advt-group.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Hybrid cloud
- Service constraints
- There are no service constraints.
- System requirements
-
- Compatible web browser supported by the vendor
- Compatible Operating System supported by the vendor
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
The service desk operates Monday to Friday 09:00 – 17:30 (excluding English public holidays).
Level | Initial Response time | Target Response Time
P1 1 Hour 1 Day
P2 4 Hours 2 Days
P3 4 Hours 10 Days
P4 4 Hours 20 Days
24 hour and weekend support can be provided at an extra cost. - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
As a hosted solution, we provide our Gold service level as default, which includes, full database management, a dedicated DBA, Real time database alerts, quarterly service review process, backup & recovery, service management, monthly statistics, real time system alerts & fix, access to system administrator (Mon - Fri: 09:00 - 17:30), security management, yearly product upgrade, cloud managed 'DR on demand' solution, point of time restore, annual DR test, DR management.
A service delivery manager will be assigned to you that will provide you with updates, upgrades and patches to both the underlying infrastructure components as well as the Integra application itself, ensuring that the you will not need to be concerned with any of the technical operations of the solution. This gives our customers peace of mind when it comes to the upkeep and maintenance of the system. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
IBSS advocate a Train the Trainer approach with key staff being trained on the system during the implementation stage. These staff then cascade the necessary training to the various users within the organisation.
In addition, training material is provided in electronic format, context sensitive help is available throughout the solution and when launched will produce help relevant to the screen on which the user invoked help.
Field level tool tips can also be customised on a per implementation basis to be relevant to your organisation and policies.
IBSS are happy to work with you to develop a training plan to meet your training requirements. - Service documentation
- Yes
- Documentation formats
-
- HTML
- Other
- Other documentation formats
- Microsoft Office
- End-of-contract data extraction
-
IBSS will agree an off-boarding plan with the customer detailing the tasks, responsibilities and timescales. As standard the off-boarding process will include a standard data extract taken and passed securely back to the customer and/or controlled destruction of the data that has been held on the system. All customer user accounts will also be removed from the service.
Where customers do not require consultancy services to off-board and would instead prefer to extract the data themselves to not incur additional charges, this can be achieved by the use of the solution’s standard extraction tools to export the data into industry standard formats such as xml and csv. - End-of-contract process
-
In the event of the termination of a contract it is imperative that the customer can continue to carry out the vital tasks that our solution has provided for, such as continuing to pay suppliers and allowing orders to be made. IBSS are committed to ensure that during a decommission, a professional services consultant is provided to ensure a smooth transition away from our solution to an alternative systems supplier.
We understand that, as part of an exit strategy, expert knowledge may be required to extract data from Integra in agreed formats to be imported in to another solution. Whilst this is not included as part of the commercial contract, IBSS provide this service on a Time and Materials basis using the agreed rate card provided.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
-
Integra Mobile provides a secure, quick and simple way to allow users to access key functions on the go by providing a secure online gateway which a user’s mobile/smartphone can connect to through their device’s Mobile Internet or Wi-Fi. As the vast majority of devices are connected at most times, remote/travelling users will be able to quickly review and approve key items even when on the move.
Integra Mobile currently includes Order Approval, Invoice Approval, and Expense Claim Entry, Enquiry, and Approval. - Service interface
- No
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- API
- Yes
- What users can and can't do using the API
- Integra is also fully capable of supporting APIs/Web Services, such as for instance connecting to an external system using RESTful API to pull or inject data, and we are would happy welcome to discussing these interface approaches further where required.
- API documentation
- No
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
-
Admin users of the solution can amend and customise individual user access permissions within the solution. Including menu / program access permissions.
Users can customise their 'homepage' view to ensure ease of access to frequently used functions within the solution.
Reference files throughout allow an organisation to customise the solution to your exact requirements. Several reporting tools are provided again allowing you to create any reporting requirements not delivered within the standard reports provided.
Admin users can customise reference files and user management (add/remove/amend users). Users can customise the layout of their homepage, add their own personal favourites.
Scaling
- Independence of resources
-
Microsoft Azure is resilient, scalable cloud platform and ensures high availability and reliability without any additional investment, management or concern by the customer enabling IT resource to be devoted to the your other projects.
We recognise that you may change your shape/size and requirements over the term. We believe that both the topology and technologies used in the solution will provide you with the agility to respond to these changes – Integra can be easily scaled both horizontal, for example, adding more application servers into a load balance cluster and vertically such as, increasing CPU/ RAM on the application servers.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Dependent on the contract, reports are either provided on a monthly or quarterly basis. These reports include:
Incident/SLA Management,
Change Management,
Performance management,
Capacity Management,
Workload/Time Management - Reporting types
-
- Real-time dashboards
- Regular reports
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Download to variety of file formats including xls, xlsx, pdf, csv, txt and xml using the Integra Extraction profile generator.
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- XML
- Text
- XLS
- XLSX
- HTML
- Native Application Reporting
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- XML
- Text
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- As an operational support system, the Service is designed to be available ‘24 x 7 x365/6’. Based on a 13 week rolling period (less any agreed requirement for planned service outages) the system is expected to be available for a minimum of 99.5% of core hours (09:00-17:30 Mon-Fri excluding Bank Holidays).
- Approach to resilience
-
Our cloud architecture involves the deployment of multiple data centres in each region with ultra-low latency interconnections and providing the capability to easily design the solution across all parts of the region.
Integra is deployed using a multi-tier architecture with different IP subnets and firewall controls separating the tiers.
Our Cloud services will be delivered from UK locations and the service will be managed by IBSS’s UK teams. The Client will access the service using the internet with no specific infrastructure requirements.
Solution is monitored by Microsoft 24x7x365 and contain security teams in conjunction with the intrusion detection and prevention capabilities.
Our Cloud data centres are built in a modular way, meaning that each data centre can be thought of as many smaller data centres built next to each other. This means that your data and system will be physically spread over different parts of the data centre, in turn meaning that even if an entire part of the data centre fails, you are unlikely to notice. Physically, all data centres have multiple redundant power grid connections, multiple redundant internet connections, redundant backup generators, and batteries to ensure resilience and mitigation of a wide variety of risk. - Outage reporting
- Real time system alerts will notify your assigned Service Delivery Manager of any service outages. The Service Delivery Manager will then alert you of the outage via email. Update emails will be sent to notify you of progress in resolution, cause of the incident, and steps taken to rectify. In the case of a Major incident, a Major Incident report will also be provided within 48 hours of the incident.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- Access details for client systems are held securely in our Customer Service software and access is restricted to only those staff that support the customers cloud based system. The support teams access the customer cloud based system via terminal services and each member of the support team has their own login credentials.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- Between 1 month and 6 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Evova/BM Trada
- ISO/IEC 27001 accreditation date
- Since 2006
- What the ISO/IEC 27001 doesn’t cover
- All activity is covered and included in the certificate scope
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- IBSS is committed to maintaining the highest risk management standards and ensuring compliance with legal and regulatory requirements. To this end, IBSS has developed a policy portfolio, which includes a Cyber & Information Security Policy and associated standards, which must be adopted as the minimum requirements. Implementing a programme of internal information security audits provides assurances that the level of conformance with the IBSS baseline Cyber & Information Security requirements are being continually assessed and any identified areas of non-conformance are being addressed by appropriate corrective actions/ risk management framework.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
ITIL based processes are followed.
- Full configuration management system tracking service components
- Full change advisory board
- All changes are assessed for risk and impact
- Includes dedicated test environments
Whilst we have our own controls for change management (in line with our ITIL-oriented service management processes) we will ensure that any upgrade process meets the requirement of your change management policies as well, including liaising with the relevant internal stakeholders to ensure the right people are aware of what is going to take place and when. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
- Internal QA and test process
- Test and deploy patches in accordance with severity
- Support regular independent penetration testing
- Active monitoring and management of network vulnerability and security threats.
- Relationships with key vendors to understand potential threats - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
- Monitor entire environment both at infrastructure and software level
- Includes monitoring individual files and folder configuration changes automatically
- Dedicated personnel for monitoring and managing the environment
- Relationships with vendors
- ITIL - deploy emergency change control and emergency escalation processes
- Incidents will be triaged
- Remediation plan in case of security incident - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
- Fully ITIL based service desk management , includes a dedicated incident management process.
- Incident knowledge-based database, each with a predefined process for resolution
- phone, email, customer support portal as available contact methods to the service desk.
- Service delivery managers provide reports, in addition self service is available through the customer support portal
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
-
- NHS Network (N3)
- Health and Social Care Network (HSCN)
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Our approach to ESG -
We are committed to building a better tomorrow for our staff, customers and wider community through outstanding environmental sustainability performance.
Our vision is underpinned by five core principles:
1. Minimise our carbon emissions.
2. Reduce the environmental footprint of our operational endeavours.
3. Foster and sustain a proactive environmental sustainability ethos.
4. Cultivate sustainability initiatives.
5. Ensure environmental compliance and surpass regulatory standards.
To achieve this vision, we have a multi-step sustainability strategy, containing details of the overarching objectives, performance targets, key performance indicators and implementation mechanisms. It is continuously reviewed to ensure it is as strong as it can be. Our success also relies on effective engagement with staff, utilising and developing their skills, knowledge and understanding.
Reducing our Carbon Footprint -
The Majority of our staff are now Home based and unnecessary travel is minimised by the delivery of consultancy, training, and implementation services remotely, where appropriate. Reducing the amount of paper we generate is a key focus, and we use recycled paper - which we then recycle ourselves. We have also taken steps to recycle other materials such as plastics and cardboard. We comply with WEEE regulations and recycle our electrical items.
We have also made changes to our approach to visiting customers on-site. Where appropriate, training and consultancy can be provided virtually.
We are focused on our transition to a Cloud service company in order to provide a sustainable approach to hosting and reducing the costly or energy inefficient hardware.
Working from home is undoubtedly challenging and may have a negative impact on the wellbeing of our employees. We hosted a wide range of virtual communal events and coffee chats) to allow our staff to stay connected to each other and regularly have team meet upsTackling economic inequality
IBSS is committed to tackling economic inequality. We have recruitment processes which seek to eradicate biases that can perpetuate economic inequality.
Our commitment to tackling economic inequality is also exemplified in our pay reporting transparency. In addition to the legal requirements to produce a Gender Pay Gap Report, we to ensure accountability and so that we can take steps to address economic inequality.Equal opportunity
Cultivating a diverse workforce and inclusive culture is a priority for IBSS. Diversity of experience, age, race, ethnicity, culture, gender and sexual orientation provides a wide range of talent from entry level through to our leadership teams creating richer perspectives and a powerful frame of reference.
Not only is it right to recognise and celebrate differences, and ensure everyone has the opportunity to thrive.Wellbeing
We take wellbeing very seriously at IBSS, all employees have access to the following initiatives to promote wellbeing.
Establishing a Benefits hub for resources and partnering to offer discounts and classes for physical and mental wellness.
Organising virtual communal events to maintain employee connectivity and support mental wellbeing during remote work arrangements.
Pricing
- Price
- £46,344.98 a unit a year
- Discount for educational organisations
- No
- Free trial available
- No