Experian

Experian Commercial Credit Management with Commercial Credit API

Streamline your risk management processes and improve your customer experience by integrating commercial credit
data into your applications. The Commercial Credit API enables you to quickly and easily integrate high-quality business
and director/owner credit information and risk scores into your systems.

Features

  • Provides easy to integrate high quality business/commercial information
  • RESTful API
  • Access to Experian’s commercial bureau
  • Official, standardised information for ERP and accounting applications
  • Access to Experian proprietary data

Benefits

  • customers to sign-up easily by auto-populating customer data
  • Minimise cost and time of gathering robust business information
  • Maintain accurate customer records by automating regular updates
  • Improve cash flow by reducing credit risk
  • Risk-averse approach to data management

Pricing

£0.54 per transaction

Service documents

Framework

G-Cloud 11

Service ID

2 2 2 9 6 6 1 3 3 1 9 7 7 9 1

Contact

Experian

Damian Kenny

+44 (0) 7976 702247

damian.kenny@experian.com

Service scope

Software add-on or extension
No
Cloud deployment model
Private cloud
Service constraints
Production Environment - The service will be available 24 hours, seven days a week (subject to the terms
covered by the Service Level Agreement).
User Acceptance Environment
The User Acceptance Testing service will be available: -
• 07:00 – 00:00 Monday to Saturday
• 09:00 – 18:00 Sunday
This environment will only be supported during normal office hours (09:00 – 17:00 Monday to Friday)
System requirements
N/A

User support

Email or online ticketing support
Email or online ticketing
Support response times
To manage our client services effectively, and in line with ITIL best practices Experian have
defined Service Levels across all core processes (incl. Incident, Service Request, Problem,
Change Management etc). Our Tiered Service Framework allows us to provide differing levels
of service and support offerings to meet our client’s needs. The Service Tier selected will define
the SLAs we work to. Engagement via a SPOC our Experian Service Desk will ensure all
interactions are recorded and assessed against impact and severity before being assigned a
"Priority".
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), 7 days a week
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Standard support is 09:00 - 17:00, enhanced packages offer up to 24/7 support availability, Enhanced support costs are determined by the user requirements.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Integration guides, Swagger and Postman Projects available, plus paid-for integration
assistance available
Service documentation
Yes
Documentation formats
  • PDF
  • Other
Other documentation formats
  • Excel
  • Swagger
End-of-contract data extraction
Data only held by Experian for support processes and is removed after period
End-of-contract process
Access to and use of the service to a defined period is included in the price. At the end of the
contract, should no renewal be agreed, the user(s) will no longer be able to access the service.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Chrome
Application to install
No
Designed for use on mobile devices
No
Service interface
No
API
Yes
What users can and can't do using the API
Full service functionality provided via API
API documentation
Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
  • Other
API sandbox or test environment
Yes
Customisation available
No

Scaling

Independence of resources
Full load balancing, multiple data centres

Analytics

Service usage metrics
Yes
Metrics types
Usage metrics included on the invoice.
Reporting types
API access

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • EU-US Privacy Shield agreement locations
User control over data storage and processing locations
No
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
In-house
Protecting data at rest
Physical access control, complying with another standard
Data sanitisation process
No
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Data is not required to be imported by the Buyer to Experian's platform therefore data export is
not required
Data export formats
Other
Other data export formats
Available on request
Data import formats
Other
Other data import formats
Available on request

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Other
Other protection between networks
-
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Other
Other protection within supplier network
SOAP endpoint TLS/1.2
REST endpoint TLS1.2

Availability and resilience

Guaranteed availability
Available on request
Approach to resilience
Experian backs up all data that has an on-going business value for operational recovery purposes and to comply with business continuity plans. Backups are regularly tested for reliability and integrity, and restoration procedures are tested for effectiveness and acceptable performance. The confidentiality, integrity and availability of backup media is protected in storage using physical, environmental and technical controls, such as secure storage and encryption.

The primary data resides in Fairham House datacentre and backup data is transferred over dedicated dark fibre links to Experian’s DR site in Bulwell. This is a very secure transfer method and the data cannot be intercepted. This data then resides on tapes in robotic silo’s and NEVER leaves this location physically, if the data is needed, it will be recalled over the same dedicated dark fibre links to Fairham.
Outage reporting
Available on request

Identity and authentication

User authentication needed
Yes
User authentication
Other
Other user authentication
Machine - machine only
Access restrictions in management interfaces and support channels
Experian works on a policy of least required access. Access to all management systems
requires appropriate approvals and is subject to automatic quarterly reviews and audit.
Access restriction testing frequency
At least once a year
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
No audit information available
Access to supplier activity audit information
No audit information available
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
DNV GL Business Assurance Ltd
ISO/IEC 27001 accreditation date
20/12/2016
What the ISO/IEC 27001 doesn’t cover
Everything is covered
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
Yes
Who accredited the PCI DSS certification
Trustwave
PCI DSS accreditation date
28/10/2016
What the PCI DSS doesn’t cover
Everything is covered
Other security certifications
Yes
Any other security certifications
Cyber Essentials

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Experian have comprehensive Global Security Policies based on the ISO27001 standard which covers;
- Organisation and Management
- Information Security
- Asset Classification
- Physical and Environmental Security
- Communications and Operations Management
- System Access
- Systems Development and Maintenance
- Compliance
- Personnel and Provisioning
- Business Continuity Management
- Third Party Management

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Modifications and improvements to information systems are managed through a controlled process. Experian's Change Management Policy is based on ITIL best practice. We use a Service Management tool that integrates Change Management, Incident Management, Problem Management, Configuration Management and Knowledge Management. Our policy, process and procedures are regularly audited independently. Business units will establish and maintain a process for documenting proposed changes to systems. The Change Management Group assess the impact of impending changes and produce an impact analysis document of results. The impact assessment considers possible risk exposures, business processes and systems.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Experian performs regular vulnerability and integrity system checks.The scheduling varies depending on criticality and exposure.
Experian has regular network security assessment conducted of internal and external deployments, in which the Firewall Infrastructure is tested, including internal components, applications, and employed servers.
Vendor software patches are applied on a monthly cycle with a risk-based approach taken to prioritisation via an automated Patch & Fix strategy which is underpinned with a technology infrastructure to deliver corrective updates.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
GSOC protects Experian information assets through a four level process:
• Collect raw log data from systems across the enterprise.
• Analyse millions of events per day using an artificial intelli-gence based correlation and behavioral analysis engine.
• Identify incidents of interest based on asset and data classification
• Escalate incidents to the appropriate response, remediation or management teams
The Security Event Monitoring (SEM) system analyses raw log data from systems across the enterprise using an advanced statistical and rule based correlation engine to identify, prioritise and alert on significant security events.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Experian has a formally documented risk based incident management process to respond to security violations, unusual or suspicious events and incidents. This process is run by the Experian's Global Security Office and is owned by the Executive.
The purpose of this process is to limit further damage to information assets, identify root cause and execute corrective actions. In the event an incident occurs a team is gathered to form an Incident Response Team, who manage activities until successful resolution. Post incident reviews are held to analyse the effectiveness of the response and operational process in order to continually improve them.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Pricing

Price
£0.54 per transaction
Discount for educational organisations
No
Free trial available
No

Service documents

Return to top ↑