CoreFiling Limited

Beacon

Filers waste significant time and resources repeatedly correcting submissions to meet regulatory reporting requirements.

Beacon provides unprecedented accuracy in inspecting XBRL & iXBRL business reporting documents, allowing filers to identify and correct XBRL errors quickly and accurately before anything is submitted.

Features

  • Inspect XBRL and iXBRL filings the same way as regulators
  • Validate filings using rules from regulation standards
  • Full APIs available to seamlessly integrate with other applications
  • Securely Store Documents

Benefits

  • Instantly review and identify XBRL filing submission errors
  • Allows the integration of customer-specific custom rules
  • Layers of validation from compliance standards to regulator rules
  • Automatic Taxonomy Updates
  • Accessed by multiple users
  • Collaboration Tool

Pricing

£75000 to £750000 per instance per year

  • Education pricing available
  • Free trial available

Service documents

G-Cloud 11

194480853651220

CoreFiling Limited

Colin Hudson

01865 203192

cth@corefiling.com

Service scope

Service scope
Software add-on or extension No
Cloud deployment model
  • Public cloud
  • Private cloud
Service constraints We carry out regular planned maintenance and product updates to our services to ensure customers are using the most secure and up-to-date version. We provide our customers with an agreed notice period for any planned downtime of a service
System requirements Supported web-browser e.g. IE 11, MS Edge, Chrome or Firefox

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Response
Priority 1 1 Operating Hour
Priority 2 2 Operating Hours
Priority 3 8 Operating Hours
Priority 4 48 Operating Hours

Resolution
Priority 1 1 Business Day
Priority 2 3 Business Days
Priority 3 30 Business Days
Priority 4 n/a

Definitions:
Priority 1:
Inability to use a business-critical feature. No user-acceptable workaround.

Priority 2:
Inability to use an important feature causing major inconvenience, not preventing business operation. No user-acceptable workaround.

Priority 3:
End User is unable to use a feature. User-acceptable workaround available.

Priority 4:
Low/no impact issue, questions, enhancement requests, etc.

Business Hours: 09:00-17:00 Mon-Fri, excluding UK bank holidays.
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels Support levels can be tailored for specific customers
Support available to third parties No

Onboarding and offboarding

Onboarding and offboarding
Getting started We provide onsite training and user documentation.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction Data stored in Beacon can be exported from the application via the user interface or through the available APIs
End-of-contract process End of contract process will be executed as per the contract agreement. A notification will be sent to the Customer advising the end date of the contractual licencing agreement. Access to Beacon will then be removed on the expiry date of the licencing agreement should the contract not be renewed.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
Application to install No
Designed for use on mobile devices No
API Yes
What users can and can't do using the API API's are available to configure the service with different taxonomies, filing rules etc.
API's are available which proivide access to the functional features of the service such as querying the data.
API's are not included to set up the service beyond configuration.
API documentation Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
API sandbox or test environment Yes
Customisation available Yes
Description of customisation The service can be customised to include support for various data sets in order to provide in-depth review and analysis.

Scaling

Scaling
Independence of resources Beacon is part of the CoreFiling Platform. This is built on a scalable, containerized, infrastructure and is deployed into AWS Auto Scaling Groups, allowing horizontal scaling to ensure sufficient resources are available to meet the demands of all users.

Analytics

Analytics
Service usage metrics Yes
Metrics types Provided on a case by case basis

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations European Economic Area (EEA)
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach In-house
Protecting data at rest
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process No
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach The iXBRL data stored in Full Beam can be exported from the application
Data export formats Other
Other data export formats
  • XHTML
  • JSON
Data import formats Other
Other data import formats
  • CSV
  • IXBRL
  • JSON
  • Excel

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability Our SLA is to provide 99.9% availability, with contractual guarantees relating to downtime during UK office hours.
Approach to resilience The service is hosted on a containerized platform that runs redundant replicas of each container for resilience. Automated monitoring performs liveness checks and starts new replicas if necessary.
Backup copies of the data are held in a distinct AWS region (i.e. in a data centre in a different country), which also serves as a disaster recovery location from which service provision can be restored if necessary.
Outage reporting Planned and serious unplanned service outages are announced to clients via email alerts from our support team. Status end-points are also available via the CoreFiling Platform APIs.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels Access to the management interfaces is restricted by IP address in addition to requiring user authentication.
Access restriction testing frequency At least once a year
Management access authentication
  • 2-factor authentication
  • Other
Description of management access authentication Add response here

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for Between 1 month and 6 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach TO BE UPDATED
Information security policies and processes Information Assurance is managed by the Head of IT reporting to the executive chairman. There are yearly reviews of policies and audits of systems. The policies, audits and incident lists are published for review by other management staff within the company.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach All changes to the production platform go through a change request process, overseen by a ITIL Certified delivery manager. This process ensures appropriate approvals are in place before changes are made. Configuration information is stored in a revision control system to track all changes made through the lifetime of the system.
Vulnerability management type Supplier-defined controls
Vulnerability management approach We have a number of systems in place including automated container vulnerability scanning, monthly patching of servers, and annual penetration testing of the service. We subscribe to relevant vendor security announcement lists in addition to monitoring the IT media for new vulnerabilities and threats.
Protective monitoring type Supplier-defined controls
Protective monitoring approach Our protective monitoring approach includes a monitoring system that provides real-time status information and alerting to our operations team. Logging is aggregated centrally to enable effective search and correlation of events to take place, and logs are mirrored to a remote location to prevent tampering.
Incident management type Supplier-defined controls
Incident management approach We have an Incident Management Process that defined the process for reporting and handling incidents. Any incidents are logged on internal issue tracking system, Bugzilla. This alerts appropriate members of staff to the incident so that they can prioritise and resolve the incident effectively as well as providing a log of such incidents. The procedure includes steps for initial investigation, containment, recovery and client notification as well as later analysis and remediation of the cause.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £75000 to £750000 per instance per year
Discount for educational organisations Yes
Free trial available Yes
Description of free trial Trial options and trial costs are considered on a case by case basis. CFL will provide a user name , password and the web-link to access Beacon along with examples of regulation profiles. Standard trial periods is for one calender month.

Service documents

pdf document: Pricing document pdf document: Skills Framework for the Information Age rate card pdf document: Service definition document pdf document: Terms and conditions
Service documents
Return to top ↑