ICHRIS (International Comprehensive Human Resource Integrated Software)
ichris is a single database cloud solution, with optional modules, that delivers a tailored, fully integrated solution. In-built report designer as standard and available across a range of devices. Frontier Software offers a feature rich, cost effective HR & Payroll solution for organisations of all sizes, across all market sectors.
Features
- Access ichris cloud from any device: PC, laptop or mobile
- Integrated, modular solution for HR, Payroll, Recruitment, Talent Management
- Real time reporting, inbuilt report designer, standard reports and dashboards
- Highly configurable to support the unique requirements of your organisation
- Employee and Manager Self- Service, and Mobile HR app
- Automated workflows, reminders and email generation
- Payroll maintained in line with statutory legislation for compliance
- Multiple country, company, language and currency options
- Access to functionality/features based on user's assigned security profile
- Software and outsourcing options for complete flexibility
Benefits
- Positive user experience, with intuitive interface whatever the device
- Support strategic decision making through data analytics and insights
- Save time and resources using supplied automated workflows with approvals
- Devolve responsibility through self-service and reduce HR administration
- Boost engagement and efficiency with self-service and mobile access
- Peace of mind using HMRC tested and recognised software
- Manage costs and risks using outsourced payroll options
- Compliance with statutory requirements ensured through regular upgrades
- Scalable to add companies, employees and users at any time
- End to end management of the employee lifecycle
Pricing
£8.13 a licence a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
8 6 9 9 9 5 6 1 4 0 7 4 1 8 8
Contact
Frontier Software plc
Sandra Walker
Telephone: 01276 456902
Email: sandra.walker@frontiersoftware.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- Details of the supported hardware configurations supplied on request. Our aim is for 100% uptime and we use all reasonable endeavours to ensure 98% availability during Frontier Software business hours. This excludes scheduled downtime (during Frontier Software business hours) for system maintenance and loading of updates, which is agreed in advance between the customer and Frontier Software.
- System requirements
-
- Supported hardware and software specification
- SQL or Oracle Licences provided by buyer
- Current/previous releases of Edge, Firefox, Safari (OSX), Chrome
- Desktop versions of 32-bit MS Office and/or O365
- Windows Server 2022,2019, 2016 with.NET framework
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Helpdesk support is available between 8.30am and 5.30pm, Monday – Friday (excluding bank holidays in England) and is provided under the annual maintenance agreement. Out of hours/weekend service available at an additional cost.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Every client is assigned a Relationship Manager.
Web, email, telephone and remote access, e.g. TeamViewer are all support methods available from the Frontier Software help desk.
There is a secure area of web site for client access 24/7, which can be used to log and track calls, download upgrades and other support materials. Client area also provides access to e-learning materials.
All help desk support during business hours is provided as part of the software fee. Out of hours may be subject to cost.
The client services team is comprised of application and technical support consultants, plus a "duty" consultant is available during Frontier Software business hours to handle more complex queries, which releases front line staff for customer calls.
On most occasions queries can be dealt with immediately, however, should the call be of a nature where immediate help is not possible, the user will be given the Log Call Number as a reference point.
The Helpdesk consultant evaluates the level of escalation depending on the category of issue (as per our SLA) and will advise the timescales involved for a solution. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Frontier Software’s approach to all implementations, is knowledge transfer to the client and the implementation training method adopted is a “train the trainer” approach. The consultant’s role is to ensure that your users are skilled and attain a level of confidence in configuring, processing and moving forward with ichris. The consultant trains and guides users in the best approach to configure and work with ichris to attain the best configuration. Our approach is to ensure that the right people are trained on the right module and at the right time.
Frontier Software also provides its clients with e-Learning tutorials on all aspects of the solution for end-users to access as required when refresher or new training is required.
Frontier Software supplies hard copies of training workbooks to training/course attendees, which contribute to the knowledge transfer conducted by our consultants. ichris provides extensive online Help and field sensitive Help functions that supplement the information provided in the training workbooks. If required, consultants can be engaged to develop end-user materials specific to your organisation.
All software releases are provided with comprehensive release notes and whitepapers covering a large range of system/technical topics are available and many can downloaded from the website. - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Data export tools are available and, through use of the report designer, export files can be generated for end of contract data extraction. The report designer is an easy to use, point-and-click tool that allows the user to extract and manipulate data, with the capability to export data in various formats, including Text, Comma-Separated Values (CSV), Extensible Markup Language (XML), Hypertext Markup Language (HTML), Excel™ (XLS) etc.
- End-of-contract process
- If Frontier Software consultancy is required to assist with extracting data at the end of contract, charges will apply at the prevailing daily rate for consultancy.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- Yes
- Compatible operating systems
-
- IOS
- Linux or Unix
- MacOS
- Windows
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- A User Experience team ensure that all new development is optimised for intuitive and responsive design. ichris has been designed around a mobile workforce as well as super user access. For mobile access, e.g. Smartphone, the service allows access to key data and workflows such as leave and time recording. A user can perform all standard tasks via the mobile application that would be delivered within the Employee Self Service, but does not have acces to the full functional capabilities of the core desktop service. For example, the ability to review reports is currently not available via the mobile device.
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- Description of service interface
- Ichris cloud is designed for access over the internet via a web browser. It has thin-client interfaces, a server based Business Rules Engine handling application logic and relational databases for data storage. It is flexible and compatible with a wide range of platforms to accommodate different infrastructure requirements.
- Accessibility standards
- WCAG 2.1 AA or EN 301 549
- Accessibility testing
-
The user interface is flexible and adaptable for use by people with a range of disabilities. For example, the ability to change screen fonts, sizes and colours for the visually impaired and the ability to use mouse or keyboard as alternative ways of achieving certain functions.
Development work for interfacing to JAWS has taken place. We have undertaken testing with JAWS and Zoomtext at the Royal Blind Society in Australia, both with positive outcomes, although currently, we are not compliant with JAWS.
Frontier Software prioritises accessibility and adopts a proactive design approach in relation to the Web Content Accessibility Guidelines (WCAG) 2.0, Level 'AA' developed by the World Wide Web Consortium (W3C). We actively consider the WCAG 2.0 guidelines and are committed to maintaining high degrees of functional alignment with WCAG v2 and W3C to provide an inclusive and accessible experience for all users. - API
- Yes
- What users can and can't do using the API
-
The API prioritises modern development practices, offering advantages like:
- Ease of Use: REST's standardised approach and familiar HTTP methods make it widely accessible to developers.
- Security: API incorporates robust security practices aligned with our standard ichris security.
- Maintainability: Automatic documentation and widespread support simplify integration and ongoing management.
It can be used to:
- automate the flow of data between ERP, WFM, HR and payroll systems, eliminating manual entry and ensuring smooth processes.
- grant authorised personnel secure remote access to payroll calculations for verification/review and approval, speeding up the payroll finalisation process.
- Developers can use the API to seamlessly connect business systems. They use API calls (following provided documentation) to exchange data, trigger actions, and integrate additional functionalities. - API documentation
- Yes
- API documentation formats
-
- Other
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
Frontier Software has made it possible to enhance its products in a structured and managed manner.
Any authorised user can undertake the following to meet specific form requirements, without the need for Frontier Software consultancy:
- change labels on fields and forms
- include other fields you need (user-defined fields)
- change the position of a field
- hide fields you do not need
You can design your own forms to store and report on a combination of data available from your ichris database. Such flexibility puts the control back into your hands and allows you to control data entry and reporting requirements. It is advisable that only users with appropriate security access undertake customisation of the system.
Tools such as the active data dictionary and the form designer tool for configuration and database schema (described above), the report designer tool for structured data export, the General Transactions (GTR) process for validated data imports, all provide easy access for clients to extend their solution.
Any user configuration is stored separately from the core program files and can configure ichris to reflect their requirements without compromising the integrity of the system. All user customisation is automatically maintained during upgrades.
Scaling
- Independence of resources
- Frontier Software does not provide a multi-tenant environment. Each client is provided a discrete environment comprised of the application and data layers for each environment. Along with the tightly-coupled and discrete web-server based presentation layers, the resulting outcome is dedicated to the client. There is no sharing amongst and of the dedicated environments.
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Data extraction is achieved using the ichris report designer, which enables the user to export data from ichris in various formats, such as Text, CSV, XML and XLS. An Import/Export tool (Spreadsheet Interface) is supplied with the ichris solution enabling users to export large volumes of data.
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- HTML
- XML
- Text
- Excel
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- XLS
- Integration to 3rd party products for data population
- GTR process utilises the ichris BRE to validate data uploads
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- Other
- Other protection between networks
- Web-based access to the hosted service application is secured via SSL connectivity through a dedicated cloud-based Web Application Firewall.
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- Other
- Other protection within supplier network
-
Data confidentiality is preserved stored in propriety format, residing on encrypted SAN and backup disk, further supplemented by secured tape backup management system.
All Confidential Information encrypted in transit, secured at rest
Certifications in ISO 27001 and ISO 9001.
Frontier Software complies with all applicable data protection and privacy legislation in the countries in which we operate.
Data cannot be modified undetectably as our application
provides thorough audit management capability. Integrity
violation, when a message is actively modified in transit, is
mitigated through the solution’s use of SSL encryption.
Availability and resilience
- Guaranteed availability
- Minimum 98% uptime, 24/7 excluding scheduled downtime for system maintenance and loading of updates, which is agreed in advance between the customer and Frontier Software. Service credits are subject to negotiation, but to date have not been necessary.
- Approach to resilience
-
• Data is replicated to DR centre every 30 minutes
• Seven days on-disk backup repository (encrypted)
• Daily backups to tape (encrypted) every weekday
• Regular testing of restores
Data Centre information can be provided upon request.
• Standby Redundant infrastructure
• Alternate location processing
• Formalised Business Continuity Planning (BCP) Policy is enforced
• Regular BCP alignment assessment
• Planned readiness rehearsal
• Regular BCP testing
• Standby Redundant infrastructure
• Alternate location processing
Further information on physical and service security available on request. - Outage reporting
-
Any outages are promptly notified to affected customers by telephone and/or email.
Scheduled downtime for system maintenance and loading of upgrades is agreed in advance with the customer.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Other
- Other user authentication
- Ichris supports a variety of authentication methods for internal or external user access such as usernames/passwords, 2 Factor authentication (2FA) or Multi Factor Authentication MFA.
- Access restrictions in management interfaces and support channels
-
Login access is provisioned by either or both of:
• Application Layer (default) user-id and password
• Single Sign On: achieved through Claims-Aware
compliant IdP services that provide identity claims
• Identity validation occurs through the Claim’s
successful consumption by our consumer layer
Frontier Software supports SSO based on SAML 2.
Transaction level security is controlled by the Business Rules Engine and user application level security profile, which applies security by user‐ID, form name, organisation area, organisation level (1‐9) and access level for all forms. Access to support is granted to authenticated users on a needs only basis. - Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- BSI
- ISO/IEC 27001 accreditation date
- 16/12/2005
- What the ISO/IEC 27001 doesn’t cover
- All areas of the business are covered
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
- BACS Approved Bureaux
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
Frontier Software's formal information security management process is contained within our information security management system (ISMS) framework. The ISMS is a key framework in our business to manage risks to our data, processes and other information assets and resources. This framework is achieved through a series of ISMS policy statements and associated controls, applicable to all Frontier Software offices.
Information security vulnerability awareness is vital to an effective ISMS and in support of this, Frontier Software is responsible for maintaining ongoing information security awareness training. Employee participation in annual security training is mandatory.
Frontier Software’s self-assessment along with industry acceptable usage establishes self-compliance to legislation and regulation. Currently, the company enjoys certifications in ISO 27001 and ISO 9001.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Frontier Software has procedures, controls and systems implemented to securely maintain and govern our infrastructure, data and information. These processes and procedures are governed by, and audited under, our ISO 27001 certification. No change will be made to the service without an appropriately authorised Change Request Service Form from the client.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Vulnerability management via ISMS Framework policy controls.
Potential security vulnerabilities, threats and risks are reported and treated in accordance with our incident and escalation management framework. All confirmed incidents are reported within a timeframe that is consistent with all legal regulatory and/or contractual obligations.
Procedures and managed controls exist to ensure a consistent approach to a prescribed and secure operation of our environment.
Vulnerability patches are applied at that point in time where it is considered and determined that reported exploits must be remediated.
Technical vulnerabilities must be assessed on a constant basis, and prioritised according to Manufacturer Severity Levels. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
All staff must be cognisant of threat and operate in accordance with our ISMS policies and controls.
Frontier Software subjects its operation including its hosting locations, to external and internal security assessment and monitoring and testing. An Intrusion Detection and Prevention process is provided under a hosted solution. Denial of Service protection is provided via a Web Application Firewall Service. Firewalls are hardened to suit at the port / service level.
Should DoS occur, we change connection parameters to provide a new connection profile, and work with the Internet Service Provider (ISP) to determine and deny the source(s) of attack. - Incident management type
- Supplier-defined controls
- Incident management approach
- All users of information services are required to report suspected security weaknesses or threats to our infrastructure or services on a continuous basis. Reported candidates will be assessed as quickly as possible and must be made know to immediate team members and escalated to the Line Manager. Security candidates must be assessed immediately and escalated to Line Management upon its confirmation of damage or disruption. Upon conformation, the candidate becomes a formal incident and treated within the Incident Escalation Framework as per our ISMS policies.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Equal opportunity
- Wellbeing
Fighting climate change
It is our policy to identify environmentally friendly initiatives that we can implement to minimise any adverse effect of our operations.Covid-19 recovery
Frontier Software now provides remote training and consultancy as required.Equal opportunity
Frontier Software supports the principles of fair treatment and equal opportunity in employment and believes that all employees should receive equal pay for the same or broadly similar work, at the same location for work rated as equivalent and for work of equal value.
We aim to ensure that no job applicant or employee receives less favourable treatment on the ground of age, sex, marital status, disability, race, religion or religious belief, colour, nationality, sexual orientation, or ethnic or national origins, or is disadvantaged by conditions or requirements which cannot be shown to be
justifiable.Wellbeing
Work from home policies. Access to gym memberships. Corporate health plan with access to support for mental and physical health.
Pricing
- Price
- £8.13 a licence a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- A requested trial is agreed on client by client basis and will be subject to discussion.