SAP Business One and Business ByDesign
At Thinc, we are helping to create Intelligent Companies. Systems and technology are designed around people. By amplifying the potential of their people, business leaders of Intelligent Companies are able to unlock huge amounts of untapped value. We create systems that enhance performance and deliver true value to your organisation.
Features
- Fully integrated ERP Software
- Delivered with SAP Hana or Microsoft SQL databases
- Industry standard Microsoft Azure platform
- Access via desktop and mobile devices
- Integrated Accounting and CRM
- Inventory, Sales, Purchasing, Production, MRP, Projects, Service
- Analytics based reporting
- Multiple company and country localisations
- Full system audit log with user authorisation
- UK based support by fully accredited personnel
Benefits
- Scalable software solution to grow as your business grows
- Greater compliance by using industry best practice business processes
- Reduced risk with agile standardisation of processes company wide
- Improved business planning and forecasting
- Full system traceability for industry body audits
- Improved data integrity and help with GDPR compliance
- Futureproofed solution because large SAP software development fund
- Used by over 60,000 business across all industry sectors
- Opportunity to maximise on the value of existing data
- Optimisation of Inventory and management of warehouses
Pricing
£23.55 a person a month
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
2 5 4 8 7 2 7 2 0 2 9 5 5 9 0
Contact
Thinc
Richard Stathers
Telephone: 0808 168 8922
Email: accounts@wearethinc.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
- No specific constraints.
- System requirements
-
- Exiting platform, hybrid, public or private-cloud
- SAP Business One software licences
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Same day response.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Onsite support
- Support levels
- Proactive Account Management part of standard support package for more details refer to terms and conditions.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Users are introduced to the new service through a blend of face-to-face and remote learning. Documentation is also provided to support user adoption of a new service. During User Acceptance Testing phase of a project specific user guides are developed and retained as part of the user documentation.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- Data may be extracted at the end of contract via a database backup or export.
- End-of-contract process
- A database backup will be provided at the end of the contract.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Different mobile applications are available depending on a user's role within the organisation.
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
- A rich set of APIs is available to integrate with many other systems, should this be required.
- API documentation
- Yes
- API documentation formats
-
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- This may be defined during the requirements definition phase of a project. Users dashboards along with multiple levels of authorisations are available right down to each individual task level. Allocated super users can when authorised change access and authorisations for other users making this very easy to manage. User defined fields are quickly and easily added to the solution with data entry validation functionality.
Scaling
- Independence of resources
- Thinc have a resourcing model that flexes with demand for both support and project delivery.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Quarterly usage reports are provided for this service to the service manager.
- Reporting types
- Regular reports
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- SAP
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Users may export their data using CSV or requesting a database backup.
- Data export formats
- CSV
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- SQL backup
- HANA
- XML
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- Refer to Service Definition document.
- Approach to resilience
- Data is stored across multiple physical locations.
- Outage reporting
- Dashboard based reporting.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- Support is delivered to authorised and verified recipients.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
- Cyber Essentials
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- Cyber Essentials
- Information security policies and processes
- Security reporting to Board level. Policies and processes have defined review cycle.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Components are tracked through their full life cycle from implementation to decommissioning. Changes are reviewed prior to implementation to assess for potential security impact.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Qualys scanning is built in to the solution. Security patch scheduling is based on vulnerability assessment.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Proactive monitoring is in place to provide early warning. Escalation procedures are in place to respond to incidents quickly.
- Incident management type
- Supplier-defined controls
- Incident management approach
- ITIL aligned incident management processes in place. End users report incidents via email or telephone. Incident reports are provided on request.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
We review the impact of data centers used to deliver services, aligning ourselves with low carbon and carbon off setters.
Pricing
- Price
- £23.55 a person a month
- Discount for educational organisations
- No
- Free trial available
- No