AccentPOS
AccentPOS is an award-winning cloud POS solution for iPad, streamlining EPOS infrastructure into one easy-to-use application for a fixed monthly cost per month. AccentPOS enables businesses to take payments, record sales, track item preparation and more.
Features
- iPad POS
- Kitchen and Bar Display (KDS)
- Wireless Communication
- Integrated Payments
- Real-time Reporting
- Delivery Integration
- Stock Management
Benefits
- Enhanced efficiency and speed of service
- Reduced costs
- Reduced wastage
Pricing
£39 a licence a month
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
9 9 3 7 1 8 3 6 2 6 0 6 5 7 9
Contact
AccentPOS
Blake Powell
Telephone: 07568333623
Email: blake.powell@accentpos.app
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- No
- System requirements
-
- IOS application (iOS 14+)
- Web Browser (Safari, Chrome, Firefox)
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Within 1 hour during working hours. Within 2 hours on weekends.
- User can manage status and priority of support tickets
- No
- Phone support
- No
- Web chat support
- Web chat
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web chat accessibility testing
- None, but our web chat is provided by a third-party who have compliance
- Onsite support
- Yes, at extra cost
- Support levels
- General support is included in the price of the subscription. Dedicated support for larger clients is available for an extra cost which will be calculated on an individual basis.
- Support available to third parties
- No
Onboarding and offboarding
- Getting started
- Online onboarding is preferred. Account setup and training can be performed online. Onboarding takes around one hour. One-site onboarding and training is also available for a fee.
- Service documentation
- Yes
- Documentation formats
- HTML
- End-of-contract data extraction
- CSV data export is available to all users
- End-of-contract process
- We will contact you to discuss your intentions. If you wish to continue using our service, we will raise a new contract. If you choose to stop using our service, the service will be terminated.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
- IOS
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Mobile application is designed as an EPOS application to take payments and manage day-to-day operations. The desktop application is designed to perform management tasks such as menu configuration, accounting, reporting and user management.
- Service interface
- No
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- API
- No
- Customisation available
- No
Scaling
- Independence of resources
- We deploy on a scalable environment hosted with AWS with auto-scaling enabled and multiple resources are running concurrently to mitigate any risks of downtime.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Metrics and reports are available to provide insights and data about the transactions processed. Reports can be used for performance optimisation, tax and payment reporting etc.
- Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
- Physical access control, complying with CSA CCM v3.0
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- CSV export is available to all users.
- Data export formats
- CSV
- Data import formats
- Other
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- We will use commercially reasonable efforts to make the SaaS available 24 hours a day, seven days a week, except for unavailability during emergency or routine maintenance.
- Approach to resilience
- Our service is hosted with AWS. More information is available on request.
- Outage reporting
- Internal email reports.
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Users are logged out when the authentication token expires.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- CSA CCM version 3.0
- ISO/IEC 27001
- Information security policies and processes
-
All controls included within Annex A of the ISO27001 standard.
Statement Of Applicability (SOA) available on request.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- All change management is undertaken in line with ISO27001 using JIRA for audit purposes.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- All non-critical patches are applied within one calendar month of release, first into UAT and then into production.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- We have traffic monitoring and content based alerting which alerts on changes to the site and/or traffic flows implemented at infrastructure and application level. We proactively monitor third party suppliers (hardware, OS, application/web and database server software) vulnerability reporting and security fix availability. Any vulnerabilities found and fixes provided by third party suppliers are patched by our infrastructure team in a timescale appropriate for their level of severity. Any penetration test findings are fixed by Development in a timescale appropriate for their level of severity.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- We operate a robust incident management process in line with ISO27001. Staff are encouraged to report all incidents using a pre-defined process
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Covid-19 recovery
-
Covid-19 recovery
Our service helps businesses to recover from the effects of the pandemic, especially for hospitality businesses that were particularly affected by closures. Our software promotes contactless service and provides a number of efficiency benefits to users that translate directly into cost-savings and revenue enhancements.
Pricing
- Price
- £39 a licence a month
- Discount for educational organisations
- No
- Free trial available
- No