Integra Associates Ltd

Unit4 Business World (Agresso) System Development Add-Ons: Expert Solutions

We have developed a range of standard Unit4 Business World (Agresso) System Development Add-ons called Expert Solutions. These include Making Tax Digital, Supplier Portal, Exchange Rate, Role Loader and User Administration.

Features

  • Standard system development add-ons
  • Send VAT returns via the HMRC's dedicated API (MTD)
  • Allow your suppliers to manage their own details (Supplier Portal)
  • Retrieve the latest exchange rates (Exchange Rate)
  • Administer roles against users and/or positions (Role Loader)
  • Manage users like never before (User Administration)

Benefits

  • Easy installation and configuration
  • Standard pricing
  • Complete with a maintenance and support package.
  • HRMC approved Making Tax Digital solution (MTD)
  • Work on desktop and web
  • MTD solution works with a number of VAT set-ups
  • Work on various milestone versions
  • Reduce human error and save time

Pricing

£1995 per licence

Service documents

G-Cloud 11

137614474403405

Integra Associates Ltd

Mark Bloomer

0333 444 1005

info@integra-associates.com

Service scope

Service scope
Software add-on or extension Yes
What software services is the service an extension to Unit4 Business World (Agresso)
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints All our solutions come with an annual maintenance & support package.
System requirements Unit4 Business World (Agresso) System

User support

User support
Email or online ticketing support Email or online ticketing
Support response times This dependant on the agreed SLA's
User can manage status and priority of support tickets Yes
Online ticketing support accessibility WCAG 2.1 A
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support Web chat
Web chat support availability 9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard WCAG 2.1 A
Web chat accessibility testing N/A
Onsite support Yes, at extra cost
Support levels We provide full application support service, supplemented by technical monitoring and reporting, and application consultancy and application development from support incidents . Each of these service costs differ depending on the type of incident or request that is being responded. All service provisions include application support as standard and can be supplemented by additional services, such as. SASS - Systems Administration Support Services RACS - Remote Application Consultancy BRM - Business Relationship Management
Support available to third parties No

Onboarding and offboarding

Onboarding and offboarding
Getting started We provide thorough documentation to enable our users to install and configure their Expert Solution. We can also provide on-site or remote consultancy to assist further at an extra charge should this be required.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction N/A
End-of-contract process All our Expert Solutions come with an annual maintenance and support package to ensure they are supported moving forward, and to help ensure on-going compliancy in such cases as Making Tax Digital.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install Yes
Compatible operating systems
  • Android
  • IOS
  • MacOS
  • Windows
Designed for use on mobile devices No
API Yes
What users can and can't do using the API Using the Making Tax Digital solution, users to are able to automatically send their VAT returns via the HMRC's dedicated API, helping to ensure full compliancy with Making Tax Digital.
API documentation Yes
API documentation formats PDF
API sandbox or test environment Yes
Customisation available No

Scaling

Scaling
Independence of resources N/A

Analytics

Analytics
Service usage metrics No

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations Yes
Datacentre security standards Managed by a third party
Penetration testing frequency At least once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach In-house destruction process

Data importing and exporting

Data importing and exporting
Data export approach User can export their data in a variety of formats including .xls, .csv, or xml.
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats
  • XML
  • XLS
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats
  • XML
  • XLS

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability Dependant on the hosting provider
Approach to resilience Available on request
Outage reporting As per the hosting provider

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels Users are able to define access by role/user.
Access restriction testing frequency At least once a year
Management access authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information You control when users can access audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information You control when users can access audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 Dependant on hosting provider chosen
ISO/IEC 27001 accreditation date N/A
What the ISO/IEC 27001 doesn’t cover N/A
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications Cyber Essentials

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes As per the hosting provider

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Our change management process is based on the Agile principles of software development. We work in iterative cycles, each aiming to improve or extend our software.
Requests for change and bug reports come in to product and are noted in as much detail as possible into our task management software. Then, before each development iteration, product and development triage new requirements, briefly discussing the scope and ramifications of each. These requirements then get placed into the development backlog of work according to the outcome of this discussion, and the entire backlog is then re-assessed against current priorities.
Vulnerability management type Undisclosed
Vulnerability management approach Available upon request.
Protective monitoring type Undisclosed
Protective monitoring approach Available upon request
Incident management type Undisclosed
Incident management approach Available upon request.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £1995 per licence
Discount for educational organisations No
Free trial available No

Service documents

pdf document: Pricing document pdf document: Terms and conditions
Service documents
Return to top ↑