Accounts Payable Automation
Sailotech's Accounts Payable Automation Service digitizes invoices, streamlining processing to minimize errors and costs. It automates data extraction, Multi language extraction, 3-way PO matching, and duplicate checking. With customizable approval workflows, a supplier portal, integration options, and unlimited user access, it offers comprehensive efficiency and accuracy in invoice management.
Features
- OCR technology for data capture and enhancement.
- Integrates with client ERP and end systems.
- Authentication options include SSO, Enterprise Single Sign-On, or Form-base.
- Supports all PO and 27 non-PO based invoices.
- Implementation of fraud detection measures.
- Capture and extraction of data from various invoice formats.
- Enables automated processing of Inbound invoices from 15 different sources.
Benefits
- Precise processing of invoice information
- 99.9% accuracy assurance
- Provides web-based accessibility for enhanced user convenience
- Integrates seamlessly with existing systems (ERP's) or operate independently
- Supports multi-company, multi-language, multi-currency Functionality
- Service benefits will be provided based on SLAs
- Service will be supported 24/7
- Real-time reports giving fast, clear and accurate data
- Swift implementation guarantees rapid Return on Investment (ROI).
Pricing
£15,000 a unit a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
7 2 0 1 8 2 3 4 7 6 4 4 2 3 0
Contact
Sailotech UK Limited
Amul Patel
Telephone: 07774939492
Email: amul.patel@sailotech.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- Our service can integrate with any of the ERP's such as Infor, Oracle, SAP, D365 etc. It can also integrate with any other financial systems.
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- There is no hardware configuration involved. If anything planned on cloud for maintenance can be notified as per SLA.
- System requirements
-
- Internet connectivity
- Google chrome, safari, Microsoft Edge or Mozilla web browser
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Depending on the priority, we resolve all the issues within 24hrs. P1 tickets are resolved in 1 - 4 hrs. P2 tickets are resolved in 6 - 8 hrs. P3 tickets are resolved in 10 - 12 hrs. P4 tickets are resolved in 12 - 24 hrs.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 A
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- WCAG 2.1 A
- Web chat accessibility testing
- During web chat testing, we ensured inclusivity by engaging participants representing diverse backgrounds and abilities. Test scenarios covered a range of interactions, such as initiating conversations, navigating menus, and accessing support resources. Each participant utilized assistive technologies pertinent to their needs, including screen readers, speech recognition software, and alternative input devices. Through these tests, we evaluated the effectiveness of accessibility features, usability challenges, and overall user experience. Feedback from participants provided valuable insights into areas for improvement, such as clarity of labels, keyboard navigation, and compatibility with assistive technologies. This rigorous testing process allowed us to identify and address accessibility barriers, ensuring that our web chat interface meets the needs of all users, regardless of their abilities. We continuously strive to enhance accessibility based on user feedback and industry best practices, fostering a more inclusive and user-friendly experience for everyone.
- Onsite support
- Yes, at extra cost
- Support levels
-
At Sailotech, we offer different levels of support to help our clients with any problems they might have.
First Level Support is about helping clients with basic issues. We train people within the client's office, called super users, to handle everyday problems. These can be things like
managing user accounts, or sorting out problems with other software we work with. This level of support is included in the service, so clients don't have to worry about extra costs.
Second Level Support is where the focus is more on technical and complex issues. Our expert team steps in to deal with tougher challenges. This could involve fixing mistakes in the code, sorting out complex settings, or making sure everything works as it should. Our team can help remotely or, if needed, come to the client's office. The cost for this level of support depends on what's needed, but we always make sure it's fair and clear. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Before User Acceptance Testing (UAT) begins, we provide on-site training at the client's head office for the UAT team. Following the training sessions, soft copy training brochures are made available immediately for reference. Throughout the UAT process, the UAT team receives full support from our Support desk via our online ticketing system.
Prior to the official "go live" stage, additional on-site training will be conducted for the wider team, and updated training manuals will be distributed. We ensure that all users receive comprehensive support from our Support desk, accessible through our online ticketing system, to address any queries or issues they may encounter. - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
-
Upon the termination of a user's contract, we prioritize facilitating the smooth extraction of their data, ensuring a seamless transition. Here's how users can extract their data:
Our platform offers intuitive data export tools, allowing users to effortlessly extract their data in various formats such as CSV or Excel. Users can select specific data sets or categories for export based on their requirements. - End-of-contract process
- When a contract ends, Users get data access for exporting, platform access stops, and renewal options are offered. Pricing includes core features and basic support. Extra costs may apply for customizing, advanced support, and additional features.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 A
- Description of service interface
- The Service Interface acts as a gateway to our application, offering users—administrators, buyers, and suppliers. Administrators wield control to configure, manage, and oversee all organizational aspects within the system. It's a centralized hub, eliminating the need for external actions, ensuring seamless management within the application itself.
- Accessibility standards
- WCAG 2.1 A
- Accessibility testing
- At Sailotech, we ensure that our service functionality is accessible to all. Our team has dedicated substantial resources to develop solutions that align with the guidelines. Moreover, we continuously enhance our functionality in specific areas to meet the requirements of WCAG 2.1 A, ensuring inclusivity for all users.
- API
- Yes
- What users can and can't do using the API
-
Our API empowers users with versatile functionality, allowing access to key operational features within our solutions such as data management and integration with third-party systems. With a comprehensive suite of SOAP and RESTful APIs, documented for user convenience, our platform facilitates seamless interaction.
During implementation, we integrate these APIs to enhance the functionality of our solutions. Furthermore, users retain the autonomy to leverage our APIs independently, empowering them to extend integration capabilities and customize their experience according to unique requirements. - API documentation
- Yes
- API documentation formats
-
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
Users can tailor approval workflows, data capture, integration settings, and user permissions to match their specific needs, ensuring seamless alignment with organizational processes.
How Users Can Customize: Accessible through an intuitive web interface or API, users can easily make adjustments using user-friendly tools and settings menu, while those with development expertise can leverage the API for deeper customization and integration.
Who Can Customize: Typically, users with administrative privileges or designated roles responsible for system configuration hold the authority to perform customizations, ensuring control over adjustments according to organizational requirements.
Scaling
- Independence of resources
- Our system is designed to dynamically adjust its capacity based on workload and demand. Load balancers are employed to efficiently manage surges in demand. We also leverage parallel threaded technology to optimize the sequential processing of tasks.
Analytics
- Service usage metrics
- Yes
- Metrics types
- To meet the needs of the user, we can offer a variety of service metrics, such as documents that are successfully processed, rejected, failed extractions, and those that are in the queue for longer than a predetermined amount of time.
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Our platform provides a seamless data export experience through an intuitive interface. With dedicated export tools supporting popular formats such as CSV, Excel, and PDF, users can effortlessly specify their desired data using filters or date ranges. Once preferences are configured, initiating the export process is as simple as a single click. The platform then swiftly compiles the selected data into the chosen format, ready for immediate download. Upon completion, users receive prompt notifications or download links, enabling convenient retrieval and saving to their preferred destinations. This streamlined process ensures efficient data extraction, empowering users with quick and easy access.
- Data export formats
-
- CSV
- ODF
- Data import formats
-
- CSV
- ODF
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- We promise reliable service with 99% uptime and scheduled maintenance outside office hours. With strict access controls and compliance measures, we ensure data security. Our Hosted Services are available 99.95% during Working Hours and 99.9% otherwise. And if we ever miss the mark, we'll make it up with Service Credits.
- Approach to resilience
- Our service is built with resilience in mind to ensure continuous operation and minimal disruptions. We implement redundant systems, backup generators, and dual firewalls to safeguard against failures. Our infrastructure includes warm Disaster Recovery systems for quick recovery in case of any incidents. We tailor our resilience measures based on individual client needs to ensure optimal performance and reliability.
- Outage reporting
- We communicate outages via email notifications, including planned maintenance notifications sent two weeks in advance. Customers who are effected are contacted directly through their nominated representatives for prompt updates on service disruptions.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- By implementing access restrictions in management interfaces and support channels, we ensure that only authorized personnel can log in and use these tools.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- BSI
- ISO/IEC 27001 accreditation date
- 28/02/2018
- What the ISO/IEC 27001 doesn’t cover
- None
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
Our information security policies and processes adhere to industry best practices and standards to safeguard the confidentiality, integrity, and availability of user data. Key components include:
Policy Framework: We maintain a comprehensive set of information security policies covering areas such as data protection, access control, incident response, and compliance with regulatory requirements.
Access Control: Access to sensitive data and systems is strictly controlled through role-based access controls, multi-factor authentication, and regular access reviews.
Data Encryption: Data in transit and at rest is encrypted using strong cryptographic algorithms to prevent unauthorized access or interception.
Incident Response: We have established procedures for detecting, assessing, and responding to security incidents promptly. This includes incident reporting channels and a designated response team to coordinate mitigation efforts.
Reporting Structure: Our information security governance framework includes clear reporting lines, with designated individuals responsible for overseeing compliance with security policies and procedures.
Monitoring and Compliance: We employ continuous monitoring tools and conduct regular audits to ensure compliance with security policies and identify areas for improvement. Non-compliance issues are addressed promptly through corrective actions and training programs.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Our configuration and change management processes, aligned with ISO27001 standards, ensure robust system integrity. We track source code using industry-standard control systems and implement electronic change control for hosted environments. Regular updates, including Microsoft Windows patches and anti-virus checks, maintain software security. Continuous monitoring of server performance allows for proactive resource allocation. Effective change management procedures guarantee transparent communication and minimize disruptions for customers.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Our vulnerability management process involves regular internal and external vulnerability scans to identify potential threats. Any issues identified are addressed promptly based on severity. Additionally, we conduct annual risk assessments internally, supplemented by third-party penetration tests to evaluate our infrastructure's security. We prioritize the deployment of code fixes within 24 hours, depending on the severity of the issue.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- We monitor firewall logs for suspicious activity, activate intrusion prevention to block threats, and use geo-blocking for added security. Upon detection, we respond immediately to address incidents, ensuring the safety of our systems.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Our incident management processes ensure uniform response and resolution. We employ defined procedures for incident detection, logging, and resolution. Users report incidents via email or Helpdesk, logged in our BI systems or IT Helpdesk. Account Managers oversee client communication, ensuring progress updates and incident reporting.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Our cloud-based service reduces the need for on-premises infrastructure, leading to lower energy consumption and carbon emissions. Additionally, we prioritize sustainable practices in our operations, such as optimizing resource usage and promoting remote work, further reducing our carbon footprint.Covid-19 recovery
We are not yet established during the Covid-19 period but after our establishment we have made sure that all our products and services help with prevention & recovery. Our service enables remote collaboration and digital transformation, supporting organizations in adapting to new ways of working. By facilitating remote access to critical systems and services, we contribute to business continuity and resilience, aiding in the recovery efforts from the impacts of Covid-19.Tackling economic inequality
We intend to offer cost-effective solutions through the G-Cloud service, enabling public sector organizations to access innovative technology without significant upfront investments. By providing affordable and scalable solutions, we help bridge the digital divide and empower organizations of all sizes to thrive in the digital economy.Equal opportunity
Our service is designed to be accessible and inclusive, ensuring that users of all backgrounds and abilities can effectively utilize our platform. We prioritize usability, compliance with accessibility standards, and provide training and support to ensure equal access and opportunity for all users.Wellbeing
Through our service, we promote employee wellbeing by facilitating remote work and flexible working arrangements. By enabling a better work-life balance and reducing the need for commuting, our service supports the physical and mental health of employees, contributing to overall wellbeing and productivity.
Pricing
- Price
- £15,000 a unit a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Based on the individual client's requirement, we adjust the trial parameters and trail period to fit their needs.
- Link to free trial
- https://trynow.ikapture.ai/