Skip to main content

Help us improve the Digital Marketplace - send your feedback

Frontier Software plc

ICHRIS (International Comprehensive Human Resource Integrated Software)

ichris is a single database cloud solution, with optional modules, that delivers a tailored, fully integrated solution. In-built report designer as standard and available across a range of devices. Frontier Software offers a feature rich, cost effective HR & Payroll solution for organisations of all sizes, across all market sectors.

Features

  • Access ichris cloud from any device: PC, laptop or mobile
  • Integrated, modular solution for HR, Payroll, Recruitment, Talent Management
  • Real time reporting, inbuilt report designer, standard reports and dashboards
  • Highly configurable to support the unique requirements of your organisation
  • Employee and Manager Self- Service, and Mobile HR app
  • Automated workflows, reminders and email generation
  • Payroll maintained in line with statutory legislation for compliance
  • Multiple country, company, language and currency options
  • Access to functionality/features based on user's assigned security profile
  • Software and outsourcing options for complete flexibility

Benefits

  • Positive user experience, with intuitive interface whatever the device
  • Support strategic decision making through data analytics and insights
  • Save time and resources using supplied automated workflows with approvals
  • Devolve responsibility through self-service and reduce HR administration
  • Boost engagement and efficiency with self-service and mobile access
  • Peace of mind using HMRC tested and recognised software
  • Manage costs and risks using outsourced payroll options
  • Compliance with statutory requirements ensured through regular upgrades
  • Scalable to add companies, employees and users at any time
  • End to end management of the employee lifecycle

Pricing

£8.13 a licence a month

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at sandra.walker@frontiersoftware.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

8 6 9 9 9 5 6 1 4 0 7 4 1 8 8

Contact

Frontier Software plc Sandra Walker
Telephone: 01276 456902
Email: sandra.walker@frontiersoftware.com

Service scope

Software add-on or extension
No
Cloud deployment model
Private cloud
Service constraints
Details of the supported hardware configurations supplied on request. Our aim is for 100% uptime and we use all reasonable endeavours to ensure 98% availability during Frontier Software business hours. This excludes scheduled downtime (during Frontier Software business hours) for system maintenance and loading of updates, which is agreed in advance between the customer and Frontier Software.
System requirements
  • Supported hardware and software specification
  • SQL or Oracle Licences provided by buyer
  • Current/previous releases of Edge, Firefox, Safari (OSX), Chrome
  • Desktop versions of 32-bit MS Office and/or O365
  • Windows Server 2022,2019, 2016 with.NET framework

User support

Email or online ticketing support
Email or online ticketing
Support response times
Helpdesk support is available between 8.30am and 5.30pm, Monday – Friday (excluding bank holidays in England) and is provided under the annual maintenance agreement. Out of hours/weekend service available at an additional cost.
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Every client is assigned a Relationship Manager.
Web, email, telephone and remote access, e.g. TeamViewer are all support methods available from the Frontier Software help desk.
There is a secure area of web site for client access 24/7, which can be used to log and track calls, download upgrades and other support materials. Client area also provides access to e-learning materials.
All help desk support during business hours is provided as part of the software fee. Out of hours may be subject to cost.
The client services team is comprised of application and technical support consultants, plus a "duty" consultant is available during Frontier Software business hours to handle more complex queries, which releases front line staff for customer calls.
On most occasions queries can be dealt with immediately, however, should the call be of a nature where immediate help is not possible, the user will be given the Log Call Number as a reference point.
The Helpdesk consultant evaluates the level of escalation depending on the category of issue (as per our SLA) and will advise the timescales involved for a solution.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Frontier Software’s approach to all implementations, is knowledge transfer to the client and the implementation training method adopted is a “train the trainer” approach. The consultant’s role is to ensure that your users are skilled and attain a level of confidence in configuring, processing and moving forward with ichris. The consultant trains and guides users in the best approach to configure and work with ichris to attain the best configuration. Our approach is to ensure that the right people are trained on the right module and at the right time.

Frontier Software also provides its clients with e-Learning tutorials on all aspects of the solution for end-users to access as required when refresher or new training is required.

Frontier Software supplies hard copies of training workbooks to training/course attendees, which contribute to the knowledge transfer conducted by our consultants. ichris provides extensive online Help and field sensitive Help functions that supplement the information provided in the training workbooks. If required, consultants can be engaged to develop end-user materials specific to your organisation.

All software releases are provided with comprehensive release notes and whitepapers covering a large range of system/technical topics are available and many can downloaded from the website.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Data export tools are available and, through use of the report designer, export files can be generated for end of contract data extraction. The report designer is an easy to use, point-and-click tool that allows the user to extract and manipulate data, with the capability to export data in various formats, including Text, Comma-Separated Values (CSV), Extensible Markup Language (XML), Hypertext Markup Language (HTML), Excel™ (XLS) etc.
End-of-contract process
If Frontier Software consultancy is required to assist with extracting data at the end of contract, charges will apply at the prevailing daily rate for consultancy.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
Yes
Compatible operating systems
  • IOS
  • Linux or Unix
  • MacOS
  • Windows
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
A User Experience team ensure that all new development is optimised for intuitive and responsive design. ichris has been designed around a mobile workforce as well as super user access. For mobile access, e.g. Smartphone, the service allows access to key data and workflows such as leave and time recording. A user can perform all standard tasks via the mobile application that would be delivered within the Employee Self Service, but does not have acces to the full functional capabilities of the core desktop service. For example, the ability to review reports is currently not available via the mobile device.
Service interface
Yes
User support accessibility
WCAG 2.1 AA or EN 301 549
Description of service interface
Ichris cloud is designed for access over the internet via a web browser. It has thin-client interfaces, a server based Business Rules Engine handling application logic and relational databases for data storage. It is flexible and compatible with a wide range of platforms to accommodate different infrastructure requirements.
Accessibility standards
WCAG 2.1 AA or EN 301 549
Accessibility testing
The user interface is flexible and adaptable for use by people with a range of disabilities. For example, the ability to change screen fonts, sizes and colours for the visually impaired and the ability to use mouse or keyboard as alternative ways of achieving certain functions.
 
Development work for interfacing to JAWS has taken place. We have undertaken testing with JAWS and Zoomtext at the Royal Blind Society in Australia, both with positive outcomes, although currently, we are not compliant with JAWS.
 
Frontier Software prioritises accessibility and adopts a proactive design approach in relation to the Web Content Accessibility Guidelines (WCAG) 2.0, Level 'AA' developed by the World Wide Web Consortium (W3C). We actively consider the WCAG 2.0 guidelines and are committed to maintaining high degrees of functional alignment with WCAG v2 and W3C to provide an inclusive and accessible experience for all users.
API
Yes
What users can and can't do using the API
The API prioritises modern development practices, offering advantages like:
- Ease of Use: REST's standardised approach and familiar HTTP methods make it widely accessible to developers.
- Security: API incorporates robust security practices aligned with our standard ichris security.
- Maintainability: Automatic documentation and widespread support simplify integration and ongoing management.

It can be used to:
- automate the flow of data between ERP, WFM, HR and payroll systems, eliminating manual entry and ensuring smooth processes.
- grant authorised personnel secure remote access to payroll calculations for verification/review and approval, speeding up the payroll finalisation process.
- Developers can use the API to seamlessly connect business systems. They use API calls (following provided documentation) to exchange data, trigger actions, and integrate additional functionalities.
API documentation
Yes
API documentation formats
  • PDF
  • Other
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Frontier Software has made it possible to enhance its products in a structured and managed manner.

Any authorised user can undertake the following to meet specific form requirements, without the need for Frontier Software consultancy:
- change labels on fields and forms
- include other fields you need (user-defined fields)
- change the position of a field
- hide fields you do not need

You can design your own forms to store and report on a combination of data available from your ichris database. Such flexibility puts the control back into your hands and allows you to control data entry and reporting requirements. It is advisable that only users with appropriate security access undertake customisation of the system.

Tools such as the active data dictionary and the form designer tool for configuration and database schema (described above), the report designer tool for structured data export, the General Transactions (GTR) process for validated data imports, all provide easy access for clients to extend their solution.

Any user configuration is stored separately from the core program files and can configure ichris to reflect their requirements without compromising the integrity of the system. All user customisation is automatically maintained during upgrades.

Scaling

Independence of resources
Frontier Software does not provide a multi-tenant environment. Each client is provided a discrete environment comprised of the application and data layers for each environment. Along with the tightly-coupled and discrete web-server based presentation layers, the resulting outcome is dedicated to the client. There is no sharing amongst and of the dedicated environments.

Analytics

Service usage metrics
No

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Data extraction is achieved using the ichris report designer, which enables the user to export data from ichris in various formats, such as Text, CSV, XML and XLS. An Import/Export tool (Spreadsheet Interface) is supplied with the ichris solution enabling users to export large volumes of data.
Data export formats
  • CSV
  • Other
Other data export formats
  • HTML
  • XML
  • Text
  • PDF
  • Excel
Data import formats
  • CSV
  • Other
Other data import formats
  • XLS
  • Integration to 3rd party products for data population
  • GTR process utilises the ichris BRE to validate data uploads

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • Other
Other protection between networks
Web-based access to the hosted service application is secured via SSL connectivity through a dedicated cloud-based Web Application Firewall.
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Other
Other protection within supplier network
Data confidentiality is preserved stored in propriety format, residing on encrypted SAN and backup disk, further supplemented by secured tape backup management system.

All Confidential Information encrypted in transit, secured at rest

Certifications in ISO 27001 and ISO 9001.

Frontier Software complies with all applicable data protection and privacy legislation in the countries in which we operate.

Data cannot be modified undetectably as our application
provides thorough audit management capability. Integrity
violation, when a message is actively modified in transit, is
mitigated through the solution’s use of SSL encryption.

Availability and resilience

Guaranteed availability
Minimum 98% uptime, 24/7 excluding scheduled downtime for system maintenance and loading of updates, which is agreed in advance between the customer and Frontier Software. Service credits are subject to negotiation, but to date have not been necessary.
Approach to resilience
• Data is replicated to DR centre every 30 minutes
• Seven days on-disk backup repository (encrypted)
• Daily backups to tape (encrypted) every weekday
• Regular testing of restores

Data Centre information can be provided upon request.
• Standby Redundant infrastructure
• Alternate location processing
• Formalised Business Continuity Planning (BCP) Policy is enforced
• Regular BCP alignment assessment
• Planned readiness rehearsal
• Regular BCP testing
• Standby Redundant infrastructure
• Alternate location processing

Further information on physical and service security available on request.
Outage reporting
Any outages are promptly notified to affected customers by telephone and/or email.

Scheduled downtime for system maintenance and loading of upgrades is agreed in advance with the customer.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Username or password
  • Other
Other user authentication
Ichris supports a variety of authentication methods for internal or external user access such as usernames/passwords, 2 Factor authentication (2FA) or Multi Factor Authentication MFA.
Access restrictions in management interfaces and support channels
Login access is provisioned by either or both of:
• Application Layer (default) user-id and password
• Single Sign On: achieved through Claims-Aware
compliant IdP services that provide identity claims
• Identity validation occurs through the Claim’s
successful consumption by our consumer layer

Frontier Software supports SSO based on SAML 2.

Transaction level security is controlled by the Business Rules Engine and user application level security profile, which applies security by user‐ID, form name, organisation area, organisation level (1‐9) and access level for all forms. Access to support is granted to authenticated users on a needs only basis.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
BSI
ISO/IEC 27001 accreditation date
16/12/2005
What the ISO/IEC 27001 doesn’t cover
All areas of the business are covered
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
Yes
Any other security certifications
BACS Approved Bureaux

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Frontier Software's formal information security management process is contained within our information security management system (ISMS) framework. The ISMS is a key framework in our business to manage risks to our data, processes and other information assets and resources. This framework is achieved through a series of ISMS policy statements and associated controls, applicable to all Frontier Software offices.

Information security vulnerability awareness is vital to an effective ISMS and in support of this, Frontier Software is responsible for maintaining ongoing information security awareness training. Employee participation in annual security training is mandatory.

Frontier Software’s self-assessment along with industry acceptable usage establishes self-compliance to legislation and regulation. Currently, the company enjoys certifications in ISO 27001 and ISO 9001.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Frontier Software has procedures, controls and systems implemented to securely maintain and govern our infrastructure, data and information. These processes and procedures are governed by, and audited under, our ISO 27001 certification. No change will be made to the service without an appropriately authorised Change Request Service Form from the client.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Vulnerability management via ISMS Framework policy controls.
Potential security vulnerabilities, threats and risks are reported and treated in accordance with our incident and escalation management framework. All confirmed incidents are reported within a timeframe that is consistent with all legal regulatory and/or contractual obligations.
Procedures and managed controls exist to ensure a consistent approach to a prescribed and secure operation of our environment.

Vulnerability patches are applied at that point in time where it is considered and determined that reported exploits must be remediated.

Technical vulnerabilities must be assessed on a constant basis, and prioritised according to Manufacturer Severity Levels.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
All staff must be cognisant of threat and operate in accordance with our ISMS policies and controls.

Frontier Software subjects its operation including its hosting locations, to external and internal security assessment and monitoring and testing. An Intrusion Detection and Prevention process is provided under a hosted solution. Denial of Service protection is provided via a Web Application Firewall Service. Firewalls are hardened to suit at the port / service level.
Should DoS occur, we change connection parameters to provide a new connection profile, and work with the Internet Service Provider (ISP) to determine and deny the source(s) of attack.
Incident management type
Supplier-defined controls
Incident management approach
All users of information services are required to report suspected security weaknesses or threats to our infrastructure or services on a continuous basis. Reported candidates will be assessed as quickly as possible and must be made know to immediate team members and escalated to the Line Manager. Security candidates must be assessed immediately and escalated to Line Management upon its confirmation of damage or disruption. Upon conformation, the candidate becomes a formal incident and treated within the Incident Escalation Framework as per our ISMS policies.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Equal opportunity
  • Wellbeing

Fighting climate change

It is our policy to identify environmentally friendly initiatives that we can implement to minimise any adverse effect of our operations.

Covid-19 recovery

Frontier Software now provides remote training and consultancy as required.

Equal opportunity

Frontier Software supports the principles of fair treatment and equal opportunity in employment and believes that all employees should receive equal pay for the same or broadly similar work, at the same location for work rated as equivalent and for work of equal value.
We aim to ensure that no job applicant or employee receives less favourable treatment on the ground of age, sex, marital status, disability, race, religion or religious belief, colour, nationality, sexual orientation, or ethnic or national origins, or is disadvantaged by conditions or requirements which cannot be shown to be
justifiable.

Wellbeing

Work from home policies. Access to gym memberships. Corporate health plan with access to support for mental and physical health.

Pricing

Price
£8.13 a licence a month
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
A requested trial is agreed on client by client basis and will be subject to discussion.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at sandra.walker@frontiersoftware.com. Tell them what format you need. It will help if you say what assistive technology you use.