PDFTables.com
PDF Tables accurately extracts data from PDFs. It uses an AI algorithm which can see column shapes, and outputs spreadsheets. There is a web API so it can be automated.
Features
- Algorithm automatically identifies tabular rows and columns in PDFs
- Convert PDF to Excel, CSV, HTML or XML
- Use from any web browser, without downloading software
- Output is streamed as it is generated
- End-to-end encryption with the same technology used by banks
- API for integration and automation using any programming language
Benefits
- Effortlessly convert PDF to a more useable format
- Publish data without altering upstream process
- Integrate data extraction into your current operations
- Automate so data arrives as it is extracted
- Replace manual document processing & save 000s of operational hours
- Convert up to 12 PDF pages per second
Pricing
£800 to £3,750.00 a unit a year
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
7 0 9 3 6 3 9 2 7 6 7 6 8 1 2
Contact
THE SENSIBLE CODE COMPANY LTD
Aine McGuire
Telephone: 0771 0377929
Email: aine@sensiblecode.io
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Service constraints
- None
- System requirements
- PDFTables requires Linux servers for private cloud deployments
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- By end of next working day, but typically quicker.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Emergency 2hrs, Urgent 4hrs, Non-Urgent 2 days Incident escalation process available
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We provide user documentation and examples for how to use the API.
- Service documentation
- Yes
- Documentation formats
- HTML
- End-of-contract data extraction
- Data is automatically provided by the service. Data is deleted after 30 days.
- End-of-contract process
- There are no additional costs to terminate and end the contract.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- User interface layout may be different for mobile.
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 A
- Description of service interface
- Users can upload PDF documents using a web user interface and view or download the extracted data as HTML, CSV, XML or Excel.
- Accessibility standards
- None or don’t know
- Description of accessibility
- We aim for at least WCAG 2.1 A but have not conducted a specific evaluation.
- Accessibility testing
- None as yet.
- API
- Yes
- What users can and can't do using the API
-
Users can use the full functionality of the service using the API.
Users authenticate their API requests using an API key obtained from the website.
No limitations. - API documentation
- Yes
- API documentation formats
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Buyers can post process data obtained through the API.
Scaling
- Independence of resources
- We monitor performance and scale our infrastructure to meet demand. We can commission independent hardware for specific customers if desired.
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- European Economic Area (EEA)
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- Less than once a year
- Penetration testing approach
- In-house
- Protecting data at rest
- Encryption of all physical media
- Data sanitisation process
- No
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Users can download uploaded files in multiple file formats.
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- Excel
- XML
- Data import formats
- Other
- Other data import formats
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- 99.99. We provide an SLA dependent on the needs of the customer. We also provide a refund model and dependent on the needs of the customer.
- Approach to resilience
- Our service always runs in multiple availability zones in Amazon Web Services EC2. Should an availability zone become unavailable, traffic is transparently routed to other zones.
- Outage reporting
- We have a public status dashboard available at http://status.sensiblecode.io/
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Management interfaces are onto the Amazon Webservices (AWS) system where we follow all the recommended procedures of Multifactor Authentication using text messages and a token device. Management user accounts have been defined with limited and controlled access to the interface; the root account is not routinely used. Only three of the developers have access to the system, and ex-employees have had their login rights deleted.
- Access restriction testing frequency
- At least once a year
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- No audit information available
- Access to supplier activity audit information
- No audit information available
- How long system logs are stored for
- Less than 1 month
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- There is a senior employee with a special interest and expertise in the field of IT security with primary access to the Amazon Web Services infrastructure. He enforces Multi-Factor Authentication on all access to the AWS system (which itself has many levels of security and access logging) among the team, as well as policies to limit the retention of user data to as little as possible. To date there has been no known unauthorized access of any of the infrastructure.
- Information security policies and processes
- Our policies predominantly follow a the guidelines set out in the Amazon Web Services (AWS) documentation for its Identity and Access Management (IAM) system. These include defining users with controlled and limited access to the infrastructure and not using the root account for routine access, requiring Multifactor Authentication (MFA) using a token device, and using AWS CloudTrail to log all access events for review. The policies are thought to be appropriate given the size of the development team (4 persons).
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Infrastructure is managed entirely through configuration files. Changes are tracked in git. Before changes are deployed into production, they undergo a review process which includes considering potential security issues and typically involves multiple members of staff.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Threats to services were assessed at the architectural design phase, and on an ongoing basis as changes are made.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- We respond promptly to security incidents. If there is a risk to customer data, customers are notified as soon as possible after the risk is understood. We are currently reviewing our processes for identifying potential compromises and we anticipate having something in place in the near future.
- Incident management type
- Supplier-defined controls
- Incident management approach
-
Users can report incidents to security@sensiblecode.io.
There is no pre-defined process for common events, as incidents are very rare.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Fighting climate change
-
Fighting climate change
The Sensible Code Company supports net zero carbon emissions by 2050.
Completed carbon reduction initiatives
- Low carbon office location
We've chosen to locate at Ormeau Baths, a technology innovation hub, in Belfast. Ormeau Baths is an 1850s retrofitted building repurposed as a low carbon office facility. As the building has no car parking, staff using the office travel there by walking, cycling or using public transport.
- We've been working from home since 2018
We implemented a full-time remote working policy for company personnel in 2018. 90% of staff work from home full-time. Staff meetings occur every quarter: we find a location that minimises staff travel and favour slow travel options where feasible.
- Reducing our carbon footprint
We published our carbon reduction plan in 2021 for the first time: https://sensiblecode.io/zero-emissions - Covid-19 recovery
-
Covid-19 recovery
The Sensible Code Company has had a 'remote first' policy since 2018. All of its staff are distributed across the UK. This meant that we were prepared for #COVID and software and support were 100% available and services were seamless throughout the pandemic. - Tackling economic inequality
-
Tackling economic inequality
The Sensible Code Company attracts and hires highly skilled software engineers and support personnel. We conduct regular reviews of market salaries and we maintain our staff by providing high salaries and flexible working and home office benefits. - Equal opportunity
-
Equal opportunity
The Sensible Code Company is an equal opportunity employer. We advertise positions open and fairly. We also offer training and development and to help our valued staff members to maintain their skills. We support staff members and when they wish to pursue professional qualifications. - Wellbeing
-
Wellbeing
The Sensible Code Company offers a combination of generous holidays 30 days plus bank holidays. It offers a 100% work from home policy and flexible working for staff who have family commitments. It also offers support where staff need training, development or other types of support and assistance.
Pricing
- Price
- £800 to £3,750.00 a unit a year
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- The trial enables users to convert a limited number of pages for free.
- Link to free trial
- https://pdftables.com/