LOVIS EOS
Our purpose is to provide powerful and simple solutions to complex enterprise problems through LOVIS EOS, the integrated, secure and reliable enterprise software platform on the cloud that is adaptive, easy to use and fast to implement. LOVIS EOS saves money, recovers time and makes people happy.
Features
- Fully configurable zero-code Enterprise Software
- Integrated beginning-to-end Business Processes
- Transactional double entry
- Three to six months implementation; easy to use
- No disruption at go-live
- Fully automated 3-D accounting creation
- No interruptions for closing procedures
- Real-time information that reflects your reality
- Profiles and roles-based workflow and security configuration
- Ready-to-use Multitenant Cloud with 99.9%+ transactional availability
Benefits
- Double your productivity
- Improve wellbeing
- 2:1 ROI from year two
Pricing
£5,000 a user a year
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
9 1 0 8 0 1 7 1 4 6 9 0 1 8 1
Contact
LOVIS WORLDWIDE LIMITED
Mariana Zapico
Telephone: +34660475878
Email: mariana.zapico@lovis.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Service constraints
- There are no restrictions on service and support. LOVIS EOS runs through RDP client from Windows, MacOS and Linux.
- System requirements
- RDP client from Windows, MacOS and Linux
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- 24 hrs or less.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- No
- Support levels
- LOVIS EOS Enterprise: 24/7
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Implementation project including project management, business process consulting, change management, foundational configuration, master data preparation, training, integral tests, detail data preparation, and go-live. Hyper care includes business process auditing, data auditing, configuration and fine-tuning. Support, online training and user documentation.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- All data entities can be downloaded by the administrators using several formats at any time, including at contract end.
- End-of-contract process
-
At the end of the contract, all data is accessible for download by the administrator.
The price is per simultaneous session and includes unlimited named users, updates, upgrades, support, full daily backups, 15-minute log backups, high availability, and a disaster recovery plan.
Using the service
- Web browser interface
- No
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Linux or Unix
- MacOS
- Windows
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
- Our API allows users to connect CRM, e-Commerce, and other platforms to interact with LOVIS EOS.
- API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Administrators can customise business processes, workflow, security roles and profiles, and data access. End-users and administrators can customise queries, reports and BI tools. Users and administrators customise via the LOVIS EOS user interface.
Scaling
- Independence of resources
- Our pool of servers provisions enough resources for all contracted simultaneous sessions and database size. Load balancing configuration assigns the least occupied servers to users at sign-on. When transactional size grows, database servers are increased on demand.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Connected users, successful log-ons, detailed and average session time, rejected log-ons, support cases, detailed and average solution time, and others.
- Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Physical access control, complying with CSA CCM v3.0
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Using our integrated DynaQube tool, users can export any data they require to diferent data forms at any time.
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- XLS
- TSV (Tab Separated Values)
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- XLS
- TSV (Tab Separated Values)
Data-in-transit protection
- Data protection between buyer and supplier networks
- Other
- Other protection between networks
- RDS connection is encripted using 2048 bits. Mouse clicks, keyboard strokes and video display commands travel through the RDS link, data does not necessarily travel through the link.
- Data protection within supplier network
- Other
- Other protection within supplier network
- Session and database servers operate within an AWS VPC; data does not travel outside the VPC, except through secured APIs via SSL.
Availability and resilience
- Guaranteed availability
- 24/7 @ 99.5% full transactional availability. A credit note, either appliable to the next payment or reimbursable, is emitted for any unavailable time above 0.5%.
- Approach to resilience
- It’s available on request
- Outage reporting
- Through a public dashboard.
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Functional and data roles and profiles connected with our Active Directory security.
- Access restriction testing frequency
- At least once a year
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- EY CertifyPoint
- ISO/IEC 27001 accreditation date
- November 18, 2010
- What the ISO/IEC 27001 doesn’t cover
- None
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
Reporting Structure
CTO: Jaime Moreno
CEO: Rafael Funes
Monthly: Security policies report revision
Weekly: Case analysis
We are open to fulfilling and improving our security practices if there is interest in us being your provider.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
1. Analysis, design and development of improvements and new functions
2. Sandbox testing and approval
3. Documentation of improvements and deployment plan
4. Agreement and scheduling of deployment
5. Deployment - Vulnerability management type
- Undisclosed
- Vulnerability management approach
-
Our team permanently monitors potential threats related to our providers' software, hardware and infrastructure, and our software.
Patches, corrections and other measures are tested in our sandbox immediately and deployed as soon as we confirm they are reliable. - Protective monitoring type
- Undisclosed
- Protective monitoring approach
-
Our team permanently monitors potential compromises related to our providers' software, hardware and infrastructure, and our software.
Patches, corrections and other measures are tested in our sandbox immediately and deployed as soon as we confirm they are reliable. - Incident management type
- Undisclosed
- Incident management approach
-
LOVIS shall provide the following Critical Support to the Client. Where the Client is unable to access the Services it may call the emergency hotline number published on the LOVIS Support Website, which is available 24 hours a day, 7 days a week.
Support on general use shall be accessed as follows:
-A user of the Services shall open a support request internally with the Client Administrator.
-The Client Administrator shall open a support case at the LOVIS Support Website.
-LOVIS shall report to the Client Administrator on such open cases once every 24 hours.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Fighting climate change
-
Fighting climate change
<1/7 carbon footprint
Pricing
- Price
- £5,000 a user a year
- Discount for educational organisations
- Yes
- Free trial available
- No