Proactis Accounts Payable (AP) Automation (Invoice Capture)
Proactis Accounts Payable (AP) Automation incorporates the Proactis Invoice Capture solution. It enables the transformation of manual, paper based invoice management processes into automated, streamlined operations that allow organisations to process purchase invoices faster and more efficiently, resulting in reduced costs and greater control.
Features
- Receive 100% of your invoices electronically, irrespective of initial format.
- Accurate and compliant data delivered straight into your Finance/ERP system.
- Modular capability, optimising invoice processing for the whole supply chain.
- Dedicated ‘Query Desk’ module to handle non-compliant invoices.
- Improve query resolution by allowing suppliers to resolve issues online.
- Secure, cloud-based solution, accessible anywhere via a web browser.
- Make invoices accessible from multiple line of business systems.
- Multi-Currency capability.
- Integration available via Rest APIs.
Benefits
- Tangible cost and time savings with reduced processing costs.
- Invoice submission and processing is faster, easier, and more accurate.
- Rapid Query resolution while supporting AP best practice processes.
- Fully integrates with your Finance/ERP system.
- Rapid deployment ensures a quick Return on Investment (ROI).
- Works requiring only a compatible browser.
- Integrates with SSO (Single-Sign On).
- Low data bandwidth requirement.
Pricing
£14,400 a unit a year
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
5 5 3 0 3 4 6 6 1 9 8 6 6 6 7
Contact
Embridge Consulting (UK) Ltd
Emma O'Brien
Telephone: 01474555505
Email: enquiries@embridgeconsulting.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- Proactis Sourcing, Proactis Supplier Management, Proactis Purchase to Pay (P2P), Proactis Marketplace, Proactis Contract Management.
- Cloud deployment model
- Private cloud
- Service constraints
- None.
- System requirements
- All services are browser based using latest version of browsers
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
For system related incident reporting/resolution, users raise a technical support ticket via our Helpdesk. The Support System is available 24/7/365, though tickets are only actioned during Helpdesk support hours (9:00am-5:30pm Monday to Friday (EU/UK/EST time) excluding Bank Holidays).
Tickets raised are managed in accordance with ticket priority levels/severity, linked to SLAs for response and resolution times as contained within the standard contract. The system is automatically monitored around the clock and issues escalated to relevant teams/individuals for investigation and remediation. Please see Maintenance and Support Services Terms attached. - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- No
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Access to support and maintenance services is provided as part of the annual subscription fees.
For all system related incident reporting and resolution, using secure, unique login details, users simply need to raise a technical support ticket in the first instance using the online Embridge ticketing portal.
An Issue Resolution process with associated SLAs would then be followed. All service desk personnel are technical engineers equipped to deal with technical issues.
The Customer Support Helpdesk is available to provide support on system issues, i.e., errors seen in the system and/or if core functionality is not working as intended. They will also be the first point of contact if you wish to raise a change/enhancement to the solution.
The Helpdesk operates from 9:00am until 17:30pm Monday to Friday (EU/UK/EST time) excluding Bank Holidays. - Support available to third parties
- No
Onboarding and offboarding
- Getting started
- Implementation will follow our project and programme management methodology for implementation of software solutions. As part of our methodology, we can provide onsite training and/or online training, and we would refer you to our Lot 3 support services listings for further details on how the software would be onboarded if implemented by Embridge Consulting. As part of our standard approach, we provide training on the use of the system to the intended ‘Trainer’s’ of the end users, i.e., the System Administrator. Training is delivered on a standard training environment, and additionally, before entering UAT, the project team steps through the configuration with the Consultant on their environment. The aim is to ensure System Administrators have the skillset and tools to make the best use of the functionality, so they can then be self-sufficient in disseminating the training information to the end users. We adopt a knowledge transfer approach, ensuring the project team users are hands on with the application throughout the project by being involved in the configuration, build and testing, thereby ensuring self-sufficiency post project.
- Service documentation
- Yes
- Documentation formats
-
- Other
- Other documentation formats
- Word
- End-of-contract data extraction
- Proactis provides an off-boarding process to provision complete copies of the Customer's data, normally in SQL backup format but other formats can be agreed.
- End-of-contract process
-
Within 14 days of termination Proactis will provide the Customer, in encrypted format, a full copy of their data in SQL format (other formats are available at additional costs). This is performed once, FOC, as part of standard off-boarding processes.
Any additional works required, e.g. extract of documents from data, querying or additional extracts of specific data are additionally charged based on requirements.
Once data has been successfully transferred, Proactis will either destroy any data still in its possession, or anonymise if system integrity is affected by deletion.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- The Service Interface allows users (Administrators, Buyers and Suppliers) to access the application via a GUI. Administrators can configure, manage and monitor all aspects of the system relating to their organisation. Nothing needs to be done outside of the system.
- Accessibility standards
- None or don’t know
- Description of accessibility
- Proactis supports the requirement to make service functionality equally accessible for everyone. Proactis Research and Development (R&D) has invested significantly in developing solutions to materially comply with the WCAG 2.0 guidelines, and continues its approach in respective functional areas to further develop functionality to comply with components of WCAG 2.1. You can find the Proactis Accessibility Statements on our website at https://www.proactis.com/uk/policies/product-accessibility/
- Accessibility testing
- Proactis has tested using these technologies ourselves, without involving third parties.
- API
- Yes
- What users can and can't do using the API
-
Proactis solutions make use of various APIs for different operational purposes, including information and data management as well as integration into third-party line of business systems.
Across the solution set, SOAP and RESTful APIs are used and fully documented. Proactis will make use of these APIs as part of any implementation, although customers will be able to consume them themselves for use in additional integrations etc. - API documentation
- Yes
- API documentation formats
-
- Other
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
Whilst Proactis solutions are customisable, in general, the preferred mechanism to meeting an organisation’s solution requirements would be to address these through configuration in the first instance, and only look to customise beyond the out of the box functionality where this would be the only way to deliver an optimal solution.
The level of configuration available in the Proactis platform ensures that Customers can build both their current 'as-is' processes, as well as their future 'to-be' processes. This can be done by the Customer themselves, Proactis Consultants or any other suitable third-party.
Scaling
- Independence of resources
- Proactis uses virtualisation and storage area network (SAN) technologies to deliver the solution to clients. The environment is constantly monitored to ensure that there are no capacity issues. This includes monitoring of both the physical host and virtual machines to ensure CPU, network, memory and disk utilisation are not exceeding usage thresholds. The infrastructure design allows us to quickly and easily add more capacity when required with little or no impact on service availability.
Analytics
- Service usage metrics
- Yes
- Metrics types
- These are configurable to the customer; commonly delivered Scheduled Reports.
- Reporting types
-
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Proactis Supplier Management, AP Automation, Marketplace, P2P, Contract Management, Sourcing
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Other
- Other data at rest protection approach
- Access to the hosted environment is only by approved Proactis personnel commensurate to their requirement in order to provision the service. All data is encrypted at rest within ISO27001 certified data centres. This is implemented via hardware assisted heads on the storage arrays and is applied to all datastores. All data is held on a secure back end network and securables (e.g. passwords etc) are 1 way salt encrypted. The data encryption Algorithm used is AES-256-XTS.
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- All Proactis solutions come with advanced reporting tools allowing the customer to extract the data they require in the format they require it in.
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- Word
- Excel
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- Excel
- Text
- XML
- JSON
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- Availability of the Hosted Services, excluding scheduled downtime, shall be 99.5% at all times. Service Credits are payable on any failure of service that does not meet expect SLA’s. Please see Maintenance and Support Services Terms attached.
- Approach to resilience
- Proactis operates its systems under no single point of failure. Additionally, warm DR systems operate in a separate data-centre, meaning live systems can be brought back with a 6hour RTO and 30minute RPO.
- Outage reporting
- Proactis will notify any Customers affected should an outage occur by contacting the Customer's nominated representatives.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Support channels can only be used by recognised and registered personnel. Management interfaces, and access to them, are fully controlled by the customer who can assign roles and responsibilities as required.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- Between 1 month and 6 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Alcumus Isoquar
- ISO/IEC 27001 accreditation date
- Last Audited September 2022
- What the ISO/IEC 27001 doesn’t cover
- Nil
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
- ISAE 3402 Type 1
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- ISO/IEC 27001
- Other
- Other security governance standards
- ISAE 3402 Type 1; Cyber Essentials and Cyber Essentials Plus
- Information security policies and processes
- Proactis is certificated to ISO 27001 and has a comprehensive suite of IS policies which are reviewed and updated each year internally by the appropriate teams. External audits of the system and processes are undertaken by Alcumus Isoqar, a UKAS accredited auditor on an annual basis. Security governance forms part of our certification. All new starters are required to read and confirm adherence to all policies and procedures, and at least annually all staff members must sign to state they have read and understood the IS policies and any updates during the period. Any failure is reported at Board level. As part of the externally-audited standards, Proactis has a dedicated, independent, Compliance Team, one of whom is also the Proactis Data Protection Officer. The team reports directly to the Chief Financial Officer. The Compliance Team is also supported by key personnel within the ITAS function (IT Availability Services).
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- All source code is tracked through life using industry standard source control, which logs all changes made and impacts. Additionally, all changes made to our hosted environments follow a full electronic change control process. Both are audited as part of our ISO27001 accreditations.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
Risk assessments are carried out at least annually by ITAS and Compliance. The infrastructure undergoes separate penetration tests conducted by an independent third party, with any outputs being assigned to a remediation plan.
We use a variety of sources to recognise potential threats. Internal and external vulnerability scans of our environments for known threats are undertaken using industry-leading software, with reports compiled and reviewed on a monthly basis. Additionally, any code fix issues can be patched and deployed within 24 hours depending on the severity of the issue. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- Through our ISO/ISAE requirements, we have specific processes and procedures in place to actively monitor and react to any potential compromises, as does our Service Provider. This process includes Board Level notification of any such suspected breaches. If such a compromise is discovered then an immediate impact assessment is performed and necessary actions taken based on this review. Normally we would inform any customers affected as soon as is practical, except for where criminal investigations must take place, in which case notifications would be done as soon as authorised by relevant authorities.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- The Proactis documented Incident Management process is audited through our ISO/ISAE accreditations. There is scope designed within the process to allow for RCAs, forensic analysis and so forth, based on the type and severity of incident.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Our services can be delivered entirely remotely, reducing carbon footprints through the removal of travel and reduction in carbon emissions, helping companies and organisations in their drive towards net zero. We are ISO14001 accredited and will always strive to influence staff, suppliers, customers, and communities to leverage the most environmentally advantageous routes to desired outcomes, including where feasible remote delivery and paperless engagements.Tackling economic inequality
We look to increase supply chain resilience and capacity. We are proud to be a Supporting Member of the Social Enterprise UK, which is the leading global authority on social enterprise partnering with and supporting social enterprise and increased social value in local and national communities across the UK. As an SME and with a keen interest in helping UK / local social enterprises (SEs) and SMEs build and grow, we look to engage SEs and SMEs wherever we can within our supply chain.Equal opportunity
We are a Disability Confident Employer and an Equal Opportunities Employer. We are proud of the employment practices under which we operate and invest heavily in sustaining a positive, supportive, and flexible workplace culture. Embridge Consulting is committed to promoting and delivering equality, diversity, inclusivity, and positive culture in the local and wider communities. A Supporting Member of the Social Enterprise UK, and a certified Disability Confident Employer, we do not believe that individuals should be measured or determined by characteristics, but by what they can do and deliver. We are a wholly inclusive employer who will always look to recruit and onboard people with the right work ethos and behaviours, as well as exceptional skills and knowledge, priding ourselves on always being able to say that we promote fairness across all of our actions. Embridge Consulting is proud of its commitment to actively support fair and equal treatment, overcoming inequality, and helping to bridge the gaps and allow people opportunity to realise their full potential. As part of our ethos, behaviours, and Disability Confident certification, we actively influence staff, suppliers, customers and communities to support disabled people and promote the representation of disabled people in a workplace setting.
We take great care to ensure that all our staff and those whom we can impact in a positive way are free from discrimination, restraint, or unfair or poor treatment, believing in the value of human beings and the contribution an individual can make for the better of our local and wider communities. We do not behave or act in a way which is contrary to these beliefs, and we would disengage immediately with any partner or business we felt to be behaving against our approach to equality and fair treatment.Wellbeing
With our positive and supportive culture of fair and equal treatment, respect, and care, we utilise our skills and abilities to deliver the best we can for the people who matter – our staff and our communities. At Embridge Consulting, our staff are given a variety of wellbeing mechanisms from Day One of employment. We have in place comprehensive support for our team members and their families and we actively encourage open conversations and collaboration on identifying wellbeing challenges and how to support resolutions for people. We have Mental Health First Aiders across our organisation who support our team members experiencing challenges and are able to lead information dissemination on wellbeing best practice and approaches to better wellbeing, physical, and mental health. We are always looking to open dialogues and drive conversations about wellbeing and influence staff, suppliers, customers, and communities to take wellbeing seriously and drive better focus on wellbeing and positive impacts across individuals and communities.
Pricing
- Price
- £14,400 a unit a year
- Discount for educational organisations
- No
- Free trial available
- No