Synergy ECM
Synergy ECM platform securely manages and shares various content types, including reports, images, and documents, across formats like PDF and Microsoft Office. It enhances productivity by providing a central repository for immediate document access, streamlining operations, supporting decisions, and improving service. This solution revolutionises document management and automates business processes.
Features
- Content storage and Document Management
- Fully automated report capture and retrieval
- Automated document recognition including OCR and ICR
- API integration for all major platforms
- Automated file batching and processing
- Outlook, Office and 365 integration
- Data analysis and Reporting
- Compliance and retention monitoring and control
- Granular access control
- Workflow automation
Benefits
- Mobile and remote access to documents and processes
- Enhanced security to protect sensitive information through robust access controls
- Manages retention policies aiding regulatory and compliance adherence
- Automates processes, reducing manual work, speeding task completion.
- Enables simultaneous document access and editing for improved teamwork.
- Ensures continuity with effective data backup and recovery solutions.
- Easily accommodates growth in data volume and business demands.
- Quick access to data enhances informed decision-making capabilities.
- Reduces physical storage and manual processing costs significantly.
Pricing
£31,683.74 a licence
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
2 5 8 3 1 1 9 7 3 8 3 8 9 8 6
Contact
ENTERPRISE CONSULTING (UK) LTD
Mark Skinner
Telephone: 07798764341
Email: mark.skinner@ecukl.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- The core system is compatible with windows server only.
- System requirements
-
- Windows server 2016 or greater
- SQL server 2017 or greater
- .NET 4.7.2 or greater
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
We respond to custom SLAs by arrangement.
Typical SLAs are usually between 9am and 5pm.
Our response times categorised by priority starting from a ten minute response time. - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Onsite support
- Support levels
-
We provide email, phone, remote and onsite support as standard with the core product.
A technical support manager will be provided as a key point of contact. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- A comprehensive on-boarding package can be arranged to meet individual requirements. Including but not limited to, onsite and online training, remote support sessions, service calls and thorough documentation.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- Data will be provided free of charge in a format specified by the user.
- End-of-contract process
- All customer data will be provided free of charge in an industry-standard format, explanations on how to access and digest this data will also be provided to ease the transition to new systems.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
- Windows
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- We use fully responsive CSS to make the mobile experience as close to like for like with the desktop version. There are no functional differences.
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- Description of service interface
-
Synergy provides a browser access portal (web client) allowing users to remotely access all of Synergy's features.
Synergy supports a JSON based REST API covering all key features. - Accessibility standards
- WCAG 2.1 AA or EN 301 549
- Accessibility testing
- Jack Henry has carried out the user testing on the Synergy Interfaces.
- API
- Yes
- What users can and can't do using the API
- There are no limitations to the features available through the API, calls can be made to access all features of the synergy system.
- API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
Profile customisation options.
Quick (saved) search availability.
Personal folders.
Quick access feature tiles.
Scaling
- Independence of resources
- Synergy is a fully scalable system with usage reporting which can be set to alert appropriate parties in the event of high system utilisation. In such events, additional instances can be started to cope with periods of high activity
Analytics
- Service usage metrics
- Yes
- Metrics types
- We capture full audit data of all functions used including data on where the function was accessed from and by whom.
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Jack Henry & Associates
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- In-house
- Protecting data at rest
- Physical access control, complying with another standard
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
-
Users can select and export data from a hitlist generated from a search query.
Data can be extracted to CSV, text or Excel formats whilst content can be exported in its original format or to PDF where applicable. - Data export formats
-
- CSV
- Other
- Other data export formats
- Text
- Data import formats
-
- CSV
- Other
- Other data import formats
- Text
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
We guarantee at least 99.5% of scheduled available time per calendar month, with any supplied software being fully functional for the same 99.5%. This does not include any scheduled maintenance.
Service credits are available up to 25% of the fees due depending on a predetermined up-time scale. - Approach to resilience
- We use primary and tertiary back-ups on all application and storage servers with full availability in the event of a fail-over situation to maximise up-time. Further information is available on request.
- Outage reporting
-
We make use of a client-accessible dashboard which provides the current service status of all services.
Email alerts are generated and sent out to nominated parties in the event of predetermined failures. These outage reports can be customised to the client's needs.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- To restrict access, we use Role-Based Access Control (RBAC) based on the principle of least privilege. This means that users are granted access only to the resources and functionalities necessary for their roles. RBAC permissions are reviewed annually to ensure they align with current business needs and security requirements. Exceptional access requests require a detailed business case submitted to the IT Department which is then evaluated by the leadership team before approval. This stringent process ensures careful management and authorization of access to sensitive systems, minimising the risk of unauthorised access and security breaches.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
The ISMS Board is responsible for developing and overseeing information security
policies, managing risks, ensuring compliance with regulations, and planning incident response. They
allocate resources, monitor effectiveness, and promote training and awareness. Regular reporting
and communication with stakeholders ensure a cohesive approach to information security
management.
The Technical Director serves as the chair of the ISMS Board and holds ultimate
responsibility for its oversight. They play a critical role in ensuring the ISMS Board, Information
Security Policies and Procedures, and the ISMS as a whole adhere to relevant regulations, laws, and
industry standards. Additionally, they are tasked with conducting an annual review of ISMS
performance throughout the organisation and disseminating findings to the entire business.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Jack Henry offers a comprehensive roadmap of upcoming changes, incorporating all requested adjustments. Detailed change notes accompany updates and patches. Changes within Enterprise Consulting's purview undergo rigorous management through our internal Change Control process. These changes are scrutinised by our Change Control Board (CCB) and executed and documented by dedicated Change implementers throughout the project lifecycle. Upon request, a thorough chronicle of alterations to Enterprise Consulting solutions is readily available.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
Jack Henry & Associates carry out frequent analysis of the latest available vulnerabilities, as well as a periodic static code evaluation on the whole Synergy ECM suite.
We conduct a monthly review of the latest vulnerabilities from diverse online databases. These inputs feed into our in-house scanning, producing a report on relevant vulnerabilities. Upon identification, we prioritise patching based on severity and impact: Critical issues are addressed within 24 hours, High within 72 hours, Medium within 1 month, and Low during routine patching cycles. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
We use a number of monitoring tools, both internal and 3rd Party provided, to continuously monitor the status of all devices and services within our network. The tools provide us with alerts when a potential compromise has been detected.
We treat all potential compromises as the highest priority (Critical) until they are resolved or our investigation finds them to be otherwise.
As Critical issues the first response will be within 30 minutes, Upon completion of the initial investigation, we then work to resolve the issue based on severity and impact, taking any steps necessary to insure a secure environment. - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
Incidents can be reported to us via phone, email or via our incident response site. The IT department or relevant incident response team will assess and classify incidents based on severity and potential impact. Incidents may be categorised as low, medium, high or critical severity, with corresponding response levels. Whilst investigating we communicate with affected parties in a transparent, timely, and consistent manner.
All incident response activities, findings, and actions taken will be documented for post-incident analysis and reporting. Reporting on individual incidents will be available in real-time, a high level report of all incidents can be provided upon request.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
We are committed as a company to promote and work in an environmentally friendly and sustainable manner. Our office strives to use sustainable sources and methods where possible, such as implementing recycling and reuse policies.
We are committed to offsetting 60 tonnes of CO2 through tree planting every year in partnership with 'Make it Wild'. This pledge will be subject to annual evaluation and adjustments.
Supporting the move towards paperless office working via the provision of the Synergy ECM system, which also promotes working from home, reducing the need for all staff to travel to work.
We ourselves support remote and flexible working, allowing staff to work from home regularly and promote car sharing when travelling on site is necessary, or the utilisation of public transport to customer sites where possible.Covid-19 recovery
Enterprise Consulting UK Ltd prioritises people's safety and the safety of its employees within the workplace. We aim to be transparent with our policies and update our internal guidelines to support COVID-19 recovery within the business. Updating staff on any changes in the working environment and practices that may be necessary to uphold these values. Some of the policies we have implemented include:
Work-from-home policy - supporting remote and flexible working.
In office working, adequate space is provided for a comfortable and safe working environment adhering to any current government advice.
Mindful employer - We are part of and adhere to the mindful employer guidelines, supporting our staff and focusing on their well-being and mental health.
Building resilience within the company to support clients, employees and the company should similar occurrences happen.
The Synergy ECM system supports other companies in COVID-19 recovery by allowing them to implement remote working where possible.
Supporting the local community through continued employment of new staff where needed during and after the Covid-19 crisis.Tackling economic inequality
Enterprise Consulting UK Ltd is committed to equal opportunities for all internal and external applicants for employment. It is our policy that all employment decisions are based on merit and the legitimate business needs of the organisation. We do not discriminate on the basis of race, colour or nationality, ethnic or national origins, sex, gender reassignment, sexual orientation, marital or civil partner status, pregnancy or maternity, disability, religion or belief,
age or any other ground on which it is or becomes unlawful to discriminate under by law.
We support continuous staff development and training within our company, allowing for growth in areas that both the company and our employees see fit.
We always strive to improve the service we provide, through software updates, innovations in technology and delivering a high-quality product for the best available price. The synergy ECM software is completely scalable to meet future changes in demand.Equal opportunity
Enterprise Consulting UK Ltd is committed to encouraging equality, diversity and inclusion among our workforce, and eliminating unlawful discrimination.
The aim is for our workforce to be truly representative of all sections of society and our customers, and for each employee to feel respected and able to give their best.
Copies of our policies on Equality, Diversity and Inclusion and a Modern Slavery Statement can be provided. These are regularly reviewed and updated as necessary.
We take seriously complaints of bullying, harassment, victimisation and unlawful discrimination by fellow employees, customers, suppliers, visitors, the public and any others in the course of the organisation’s work activities. Such acts will be dealt with as misconduct under the organisation’s grievance and/or disciplinary procedures, and appropriate action will be taken.
We support equal opportunities for staff development and training within the company, allowing individuals at all levels to progress in their careers.Wellbeing
We are committed to supporting the mental health and well-being of our staff as they form the foundation of our company. We believe in optimising the workplace for success while fostering a positive and supportive environment for our team. To further support this ethos we have signed up for the Mindful Employer pledge.
Mindful employer - We are part of and adhere to the mindful employer guidelines, supporting our staff and focusing on their well-being and mental health. Being part of this pledge allows us access to resources to help our staff with a range of workplace and home-related matters should they require advice or assistance.
To allow employees to step away from their usual tasks, we make use of team-building activities and staff excursions.
Pricing
- Price
- £31,683.74 a licence
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- We can provide a fully featured 30 day trial of the system.