Skip to main content

Help us improve the Digital Marketplace - send your feedback

Sailotech UK Limited

Accounts Payable Automation

Sailotech's Accounts Payable Automation Service digitizes invoices, streamlining processing to minimize errors and costs. It automates data extraction, Multi language extraction, 3-way PO matching, and duplicate checking. With customizable approval workflows, a supplier portal, integration options, and unlimited user access, it offers comprehensive efficiency and accuracy in invoice management.

Features

  • OCR technology for data capture and enhancement.
  • Integrates with client ERP and end systems.
  • Authentication options include SSO, Enterprise Single Sign-On, or Form-base.
  • Supports all PO and 27 non-PO based invoices.
  • Implementation of fraud detection measures.
  • Capture and extraction of data from various invoice formats.
  • Enables automated processing of Inbound invoices from 15 different sources.

Benefits

  • Precise processing of invoice information
  • 99.9% accuracy assurance
  • Provides web-based accessibility for enhanced user convenience
  • Integrates seamlessly with existing systems (ERP's) or operate independently
  • Supports multi-company, multi-language, multi-currency Functionality
  • Service benefits will be provided based on SLAs
  • Service will be supported 24/7
  • Real-time reports giving fast, clear and accurate data
  • Swift implementation guarantees rapid Return on Investment (ROI).

Pricing

£15,000 a unit a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at amul.patel@sailotech.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

7 2 0 1 8 2 3 4 7 6 4 4 2 3 0

Contact

Sailotech UK Limited Amul Patel
Telephone: 07774939492
Email: amul.patel@sailotech.com

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Our service can integrate with any of the ERP's such as Infor, Oracle, SAP, D365 etc. It can also integrate with any other financial systems.
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints
There is no hardware configuration involved. If anything planned on cloud for maintenance can be notified as per SLA.
System requirements
  • Internet connectivity
  • Google chrome, safari, Microsoft Edge or Mozilla web browser

User support

Email or online ticketing support
Email or online ticketing
Support response times
Depending on the priority, we resolve all the issues within 24hrs. P1 tickets are resolved in 1 - 4 hrs. P2 tickets are resolved in 6 - 8 hrs. P3 tickets are resolved in 10 - 12 hrs. P4 tickets are resolved in 12 - 24 hrs.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 A
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
Web chat
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
WCAG 2.1 A
Web chat accessibility testing
During web chat testing, we ensured inclusivity by engaging participants representing diverse backgrounds and abilities. Test scenarios covered a range of interactions, such as initiating conversations, navigating menus, and accessing support resources. Each participant utilized assistive technologies pertinent to their needs, including screen readers, speech recognition software, and alternative input devices. Through these tests, we evaluated the effectiveness of accessibility features, usability challenges, and overall user experience. Feedback from participants provided valuable insights into areas for improvement, such as clarity of labels, keyboard navigation, and compatibility with assistive technologies. This rigorous testing process allowed us to identify and address accessibility barriers, ensuring that our web chat interface meets the needs of all users, regardless of their abilities. We continuously strive to enhance accessibility based on user feedback and industry best practices, fostering a more inclusive and user-friendly experience for everyone.
Onsite support
Yes, at extra cost
Support levels
At Sailotech, we offer different levels of support to help our clients with any problems they might have.

First Level Support is about helping clients with basic issues. We train people within the client's office, called super users, to handle everyday problems. These can be things like
managing user accounts, or sorting out problems with other software we work with. This level of support is included in the service, so clients don't have to worry about extra costs.

Second Level Support is where the focus is more on technical and complex issues. Our expert team steps in to deal with tougher challenges. This could involve fixing mistakes in the code, sorting out complex settings, or making sure everything works as it should. Our team can help remotely or, if needed, come to the client's office. The cost for this level of support depends on what's needed, but we always make sure it's fair and clear.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Before User Acceptance Testing (UAT) begins, we provide on-site training at the client's head office for the UAT team. Following the training sessions, soft copy training brochures are made available immediately for reference. Throughout the UAT process, the UAT team receives full support from our Support desk via our online ticketing system.

Prior to the official "go live" stage, additional on-site training will be conducted for the wider team, and updated training manuals will be distributed. We ensure that all users receive comprehensive support from our Support desk, accessible through our online ticketing system, to address any queries or issues they may encounter.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Upon the termination of a user's contract, we prioritize facilitating the smooth extraction of their data, ensuring a seamless transition. Here's how users can extract their data:

Our platform offers intuitive data export tools, allowing users to effortlessly extract their data in various formats such as CSV or Excel. Users can select specific data sets or categories for export based on their requirements.
End-of-contract process
When a contract ends, Users get data access for exporting, platform access stops, and renewal options are offered. Pricing includes core features and basic support. Extra costs may apply for customizing, advanced support, and additional features.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
No
Service interface
Yes
User support accessibility
WCAG 2.1 A
Description of service interface
The Service Interface acts as a gateway to our application, offering users—administrators, buyers, and suppliers. Administrators wield control to configure, manage, and oversee all organizational aspects within the system. It's a centralized hub, eliminating the need for external actions, ensuring seamless management within the application itself.
Accessibility standards
WCAG 2.1 A
Accessibility testing
At Sailotech, we ensure that our service functionality is accessible to all. Our team has dedicated substantial resources to develop solutions that align with the guidelines. Moreover, we continuously enhance our functionality in specific areas to meet the requirements of WCAG 2.1 A, ensuring inclusivity for all users.
API
Yes
What users can and can't do using the API
Our API empowers users with versatile functionality, allowing access to key operational features within our solutions such as data management and integration with third-party systems. With a comprehensive suite of SOAP and RESTful APIs, documented for user convenience, our platform facilitates seamless interaction.

During implementation, we integrate these APIs to enhance the functionality of our solutions. Furthermore, users retain the autonomy to leverage our APIs independently, empowering them to extend integration capabilities and customize their experience according to unique requirements.
API documentation
Yes
API documentation formats
  • HTML
  • PDF
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Users can tailor approval workflows, data capture, integration settings, and user permissions to match their specific needs, ensuring seamless alignment with organizational processes.

How Users Can Customize: Accessible through an intuitive web interface or API, users can easily make adjustments using user-friendly tools and settings menu, while those with development expertise can leverage the API for deeper customization and integration.

Who Can Customize: Typically, users with administrative privileges or designated roles responsible for system configuration hold the authority to perform customizations, ensuring control over adjustments according to organizational requirements.

Scaling

Independence of resources
Our system is designed to dynamically adjust its capacity based on workload and demand. Load balancers are employed to efficiently manage surges in demand. We also leverage parallel threaded technology to optimize the sequential processing of tasks.

Analytics

Service usage metrics
Yes
Metrics types
To meet the needs of the user, we can offer a variety of service metrics, such as documents that are successfully processed, rejected, failed extractions, and those that are in the queue for longer than a predetermined amount of time.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Our platform provides a seamless data export experience through an intuitive interface. With dedicated export tools supporting popular formats such as CSV, Excel, and PDF, users can effortlessly specify their desired data using filters or date ranges. Once preferences are configured, initiating the export process is as simple as a single click. The platform then swiftly compiles the selected data into the chosen format, ready for immediate download. Upon completion, users receive prompt notifications or download links, enabling convenient retrieval and saving to their preferred destinations. This streamlined process ensures efficient data extraction, empowering users with quick and easy access.
Data export formats
  • CSV
  • ODF
Data import formats
  • CSV
  • ODF

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
We promise reliable service with 99% uptime and scheduled maintenance outside office hours. With strict access controls and compliance measures, we ensure data security. Our Hosted Services are available 99.95% during Working Hours and 99.9% otherwise. And if we ever miss the mark, we'll make it up with Service Credits.
Approach to resilience
Our service is built with resilience in mind to ensure continuous operation and minimal disruptions. We implement redundant systems, backup generators, and dual firewalls to safeguard against failures. Our infrastructure includes warm Disaster Recovery systems for quick recovery in case of any incidents. We tailor our resilience measures based on individual client needs to ensure optimal performance and reliability.
Outage reporting
We communicate outages via email notifications, including planned maintenance notifications sent two weeks in advance. Customers who are effected are contacted directly through their nominated representatives for prompt updates on service disruptions.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
By implementing access restrictions in management interfaces and support channels, we ensure that only authorized personnel can log in and use these tools.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
BSI
ISO/IEC 27001 accreditation date
28/02/2018
What the ISO/IEC 27001 doesn’t cover
None
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Our information security policies and processes adhere to industry best practices and standards to safeguard the confidentiality, integrity, and availability of user data. Key components include:

Policy Framework: We maintain a comprehensive set of information security policies covering areas such as data protection, access control, incident response, and compliance with regulatory requirements.

Access Control: Access to sensitive data and systems is strictly controlled through role-based access controls, multi-factor authentication, and regular access reviews.

Data Encryption: Data in transit and at rest is encrypted using strong cryptographic algorithms to prevent unauthorized access or interception.

Incident Response: We have established procedures for detecting, assessing, and responding to security incidents promptly. This includes incident reporting channels and a designated response team to coordinate mitigation efforts.

Reporting Structure: Our information security governance framework includes clear reporting lines, with designated individuals responsible for overseeing compliance with security policies and procedures.

Monitoring and Compliance: We employ continuous monitoring tools and conduct regular audits to ensure compliance with security policies and identify areas for improvement. Non-compliance issues are addressed promptly through corrective actions and training programs.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Our configuration and change management processes, aligned with ISO27001 standards, ensure robust system integrity. We track source code using industry-standard control systems and implement electronic change control for hosted environments. Regular updates, including Microsoft Windows patches and anti-virus checks, maintain software security. Continuous monitoring of server performance allows for proactive resource allocation. Effective change management procedures guarantee transparent communication and minimize disruptions for customers.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Our vulnerability management process involves regular internal and external vulnerability scans to identify potential threats. Any issues identified are addressed promptly based on severity. Additionally, we conduct annual risk assessments internally, supplemented by third-party penetration tests to evaluate our infrastructure's security. We prioritize the deployment of code fixes within 24 hours, depending on the severity of the issue.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
We monitor firewall logs for suspicious activity, activate intrusion prevention to block threats, and use geo-blocking for added security. Upon detection, we respond immediately to address incidents, ensuring the safety of our systems.
Incident management type
Supplier-defined controls
Incident management approach
Our incident management processes ensure uniform response and resolution. We employ defined procedures for incident detection, logging, and resolution. Users report incidents via email or Helpdesk, logged in our BI systems or IT Helpdesk. Account Managers oversee client communication, ensuring progress updates and incident reporting.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

Our cloud-based service reduces the need for on-premises infrastructure, leading to lower energy consumption and carbon emissions. Additionally, we prioritize sustainable practices in our operations, such as optimizing resource usage and promoting remote work, further reducing our carbon footprint.

Covid-19 recovery

We are not yet established during the Covid-19 period but after our establishment we have made sure that all our products and services help with prevention & recovery. Our service enables remote collaboration and digital transformation, supporting organizations in adapting to new ways of working. By facilitating remote access to critical systems and services, we contribute to business continuity and resilience, aiding in the recovery efforts from the impacts of Covid-19.

Tackling economic inequality

We intend to offer cost-effective solutions through the G-Cloud service, enabling public sector organizations to access innovative technology without significant upfront investments. By providing affordable and scalable solutions, we help bridge the digital divide and empower organizations of all sizes to thrive in the digital economy.

Equal opportunity

Our service is designed to be accessible and inclusive, ensuring that users of all backgrounds and abilities can effectively utilize our platform. We prioritize usability, compliance with accessibility standards, and provide training and support to ensure equal access and opportunity for all users.

Wellbeing

Through our service, we promote employee wellbeing by facilitating remote work and flexible working arrangements. By enabling a better work-life balance and reducing the need for commuting, our service supports the physical and mental health of employees, contributing to overall wellbeing and productivity.

Pricing

Price
£15,000 a unit a year
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Based on the individual client's requirement, we adjust the trial parameters and trail period to fit their needs.
Link to free trial
https://trynow.ikapture.ai/

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at amul.patel@sailotech.com. Tell them what format you need. It will help if you say what assistive technology you use.