Web Store integration with Back Office systems
The solution provides for the integration with third party web store solutions such as WooCommerce® with customers existing back end systems such as in-house or cloud for inventory, customer records (CRM), service details, asset management and accounting systems to provide an integrated cloud based Azure solution for desktop or mobile
Features
- On line and off line functionality
- Add a mobile layer without re-inventing processes or systems:
- IT management and control with graphical management tools
- Out of the office, but still connected
- End-users control which records they synchronize to their device
- Non-mobile users can same applications/data as the mobile users
- Read access can be defined differently for each database table
- User and Groups are defined once in SecSQL Directory database
- View available in graphical, GPS mapping, photo and text
- Available on iOS, Android, UWP via SaaS or on-premise
Benefits
- Provides security for row level to any SQL database/application
- Application of SecSQL to an existing database
- Limiting Create or Delete records or tables by user
- Read or Update control applies across all database tables
- Update can be defined differently for each database table
- Can be applied at design stage or for existing databases/applications
- Records can be synchronized across all mobile or desktop applications
- Suited for api integration
- Written in PowerApps
Pricing
£11.50 to £19.50 a user a month
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
5 9 4 4 0 9 3 4 6 4 0 4 3 6 1
Contact
Xenium Solutions Limited
Bruce Murchie
Telephone: +447802227837
Email: brucem@xeniumsolutions.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- We are unaware of any constraints.
- System requirements
-
- For iOS devices either tablet or phone
- For Android devices either tablet or phone
- For UWP tablet or desktop
- Operates with MS SQL Server any versions
- Integrates with third party systems with api's
- Support for web services
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Response are based upon the urgency of the matter. These are usually within 4 to 6 hours Monday to Friday
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- Set a standard that meets the customers requirements
- Web chat accessibility testing
- None to date
- Onsite support
- Onsite support
- Support levels
- Annual support and maintenance is charged in advanced for the year based on the number of users and covers system updates and product maintenance that covers upgrades to new operating system updates. We also work with our customer base to provide with two update product releases that add new features. this service is provided on a discounted cost basis above annual support and maintenance. All support is remote.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
A series of customer designed online training tools have been developed to assist new customers. As each customer operates under a difference set of business rules and models these can be used as a guide to establish a new customers training criteria.
In general there is little training that is required to use the application given that the existing user will have prior knowledge of how to use the desktop versions of the mobile applications. - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Their data is not stored in our SaaS as all data that is entered in the mobile client is uploaded as soon as the user presses the send key given that they a have a mobile on-line connection. Data is only stored in the police forces databases and not as stated in the SaaS.
- End-of-contract process
- There are no additional costs for end of service.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- MacOS
- Windows
- Windows Phone
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- The same functionality is provided on both desktop and mobile device be that a smartphone or a tablet. A thick on device client is installed for use on a mobile device or Windows tablet. On a desktop the application uses a browser to access the application.
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- As required by the customer to meet their demands.
- Accessibility standards
- None or don’t know
- Description of accessibility
- There are no constraints in this area
- Accessibility testing
- These have not been required to date
- API
- Yes
- What users can and can't do using the API
- As the application is based on custom code base we provided dedicated api's based on the customers requirements and needs.
- API documentation
- Yes
- API documentation formats
-
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- The service can be customised by the users. The user has TOTAL control if required to customise the forms. What we provide is a framework for either ourselve to generate the form or you the customer to generate the forms.
Scaling
- Independence of resources
- This has been tested with over several hundred concurrent users across the EU with no desegregation of data or capability for use of the service.
Analytics
- Service usage metrics
- Yes
- Metrics types
- These are available and are specified by the customer
- Reporting types
- Reports on request
Resellers
- Supplier type
- Reseller providing extra support
- Organisation whose services are being resold
- A range of companies. Details provided on request
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
- Physical access control, complying with another standard
- Data sanitisation process
- No
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- They do not as it connect to the users back end systems that reside behind their own firewall.
- Data export formats
-
- CSV
- Other
- Other data export formats
- Non possible
- Data import formats
-
- CSV
- Other
- Other data import formats
- Not required
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- SLAs are provided on a customer by customer basis. As one example, one customer required that if SLAs were not achieved, then a deduction from the annual maintenance payment would be withheld.
- Approach to resilience
- It's available on request
- Outage reporting
- Can be interfaced to third party tool sets via APIs
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- Access is defined according to user defined roles and controlled usually in conjunction with Microsoft Active Directory (AD) defined roles. This is done in conjunction with the customers requirements where necessary
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- These are available on request
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- All change management is defined and discussed with the customer as required by the level of their standard set usually with a UK police force.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- In conjunction with our customers we seek to operate three systems covering demonstration, UAT and live and through these three systems we coordinate with the customer when and how and what patches need to be released when approved by the customer from UAT to live. The potential threats if any are informative by the customer and monitoring tools.
- Protective monitoring type
- Undisclosed
- Protective monitoring approach
- We respond is accordance with the degree of urgency that is required by the customer to address any issues that arise.
- Incident management type
- Undisclosed
- Incident management approach
- We have a customer portal that allows for direct reporting of any and all issues that generate incident reports to the support team for immediate response.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
WellbeingWellbeing
The application removes doubt that the user will have that they are working with the latest data when operating on a mobile device
Pricing
- Price
- £11.50 to £19.50 a user a month
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- Full system for 25 users for 3 months from day of the connection being operational.
- Link to free trial
- Email a request