I-Procure Technology Limited

I-Procure - Procurement Management Software

I-Procure has been developed to plug the gap within the existing procurement management software market by providing the tools for effective procurement management.


  • Web-based technology application
  • Project management of all re-procurements and new procurement projects
  • Identification of Enterprise, Category & Individual performance
  • Contract's Risk Management
  • 24/7 service with dedicated account staff and specialist consultants
  • Real-time management information
  • Supplier Management module - PCR 2015 DPS Compliant
  • User mobile app


  • Target and record savings targets
  • Manage slippage
  • Gain Greater visibility and control
  • Central Contract's database
  • Process efficiencies
  • Greater Insight & Intelligence


£175 to £250 per licence per month

  • Education pricing available
  • Free trial available

Service documents


G-Cloud 11

Service ID

2 7 5 7 6 3 5 3 1 2 6 9 4 1 6


I-Procure Technology Limited

Andrew Weston

0781 089 8210


Service scope

Software add-on or extension
Cloud deployment model
Private cloud
Service constraints
I-Procure operates a pre-planned comprehensive maintenance schedule. Customers will be notified of any system downtime.
Constraints include software access via approved browsers only, which is subject to quarterly updates without notification
System requirements
  • Buyers need to purchase a software license from I-Procure
  • Access to the Internet

User support

Email or online ticketing support
Yes, at extra cost
Support response times
When raising tickets, users complete a series of questions, which enables I-Procure to assign each ticket a priority rating. Priority Level 1: The technology is ‘down’/inaccessible. Priority Level 2: Operation of the technology is severely degraded. Priority Level 3: Certain non-essential features of the technology are impaired. Priority Level 4: Low priority queries – Password resets I-Procure operates a 24-7 Help Desk, who will look to resolve all Priority Level, 3, 2 and 1 issues within 2 business days, 1 business day and within 2 hours respectively. All Priority Level 4 issues will be sent to our Customer's to resolve
User can manage status and priority of support tickets
Online ticketing support accessibility
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Yes, at an extra cost
Web chat support availability
9 to 5 (UK time), 7 days a week
Web chat support accessibility standard
WCAG 2.1 AA or EN 301 549
Web chat accessibility testing
Audio: We use sound to improve user accessibility. When a user receives a new message or their place in the que moves up, we signal this with a particular sound. Aria-label: Our web-chat uses aria-labels on elements that don't have enough descriptive text For example: ‘Close the webchat’ is better than ‘Close
Onsite support
Yes, at extra cost
Support levels
1st line customer support
Any issues/faults with I-Procure which are defined as:
Severity Level 1 - the platform is down or inaccessible or
Severity Level 2 - the operation of the platform is severely degraded, or non-business critical components of the service are not operational should be escalated to I-Procure's 1st line support team either by telephone or via the platform (subject to availability). I-Procure will look to resolve all Severity Level 1 or 2 issues within the following timeframes:

Severity Level 1: 2 hours
Severity Level 2: Within 1 business day

All system support is covered within the license fee payable by customers. Individual or Team license customers will receive email support only. Enterprise license customers will receive telephone support on top of email support. Telephone support will be available Monday-Friday, 9am to 5pm. Enterprise customers will be provided with their own dedicated technical account manager.
Support available to third parties

Onboarding and offboarding

Getting started
I-Procure incorporates a series of built-in wizards and templates which make using the software, simple, easy and straight forward for users. Customers can upload their entire contract or project database into the software within a matter of seconds.

The platform also includes a help-library and tutorials that are designed to support and encourage self-learning. Customers can request training from I-Procure either over the web or face to face for an additional cost.
Service documentation
Documentation formats
  • HTML
  • ODF
  • PDF
End-of-contract data extraction
At the end of any contract period, I-Procure will provide all platform users with sufficient time, during which they will still be able to login to the platform and complete any necessary actions/transactions.

We will not charge customers a fee for exiting a contract.

We propose passwords for Senior platform users remain active for a period of 30 days after conclusion of contact, and 14 days for all other platform users.

I-Procure will create a denormalised SQL server database with all user, company and transactional data, which will be provided to customers on an encrypted disc.
End-of-contract process
Upon receipt of notification from a customer that they wish to terminate and/or not extend their contract with I-Procure, all data will be transferred back to the customer in a format agreed during the exit process.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
I-Procure has not developed an app.

Customers can however access the platform via the web-browser on their phone.
Service interface
What users can and can't do using the API
I-Procures API Gateway enables us to configure connections to any third party system so that our customers can integrate to any other systems that support API connections
API documentation
API documentation formats
API sandbox or test environment
Customisation available
Description of customisation
Customers are able to customise the I-Procure platform in a number of ways:

- Add their logo, change colour screen
- Restrict which users have access to the platform and their permission
- Hide Menu Screens and Tabs

System admin users will be able to make the above customisations. We will provide this training during the initial set-up phase.


Independence of resources
Each customer will be provided with their own instance of the I-Procure platform that they will be able to customise accordingly.

I-Procure will ensure secure, reliable network performance for all customers.

From a technical support perspective, customers will be provided with be assigned a dedicated technical support account manager.


Service usage metrics
Metrics types
I-Procure can provide customers on request, with management information pertaining to system usage.

Customers will be able to view and manage within the platform itself, the issue and allocation of platform licenses, based on the current usage of the platform by users.
Reporting types
  • Real-time dashboards
  • Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
Physical access control, complying with SSAE-16 / ISAE 3402
Data sanitisation process
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Users may export their data via the reporting section of the tool, into a series of pre-defined Microsoft Excel reporting formats.
Data export formats
Other data export formats
Microsoft Excel
Data import formats
Other data import formats
Microsoft Excel

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
I-Procure will aim to provide customers with a 24/7 accessible service, excluding emergency maintenance windows (if taken during hours of 5am-8am GMT) weekly maintenance windows, and extended maintenance windows.

We would look to provide customers a system uptime of greater than 95%. Failure to achieve this, will result in customers being provided with service credits.
Approach to resilience
Available on request.
Outage reporting
Email Alerts.

Customers will receive email alerts notifying them of any system outages, whether planned or unexpected. In relation to planned outages, these will be communicated to customers on their home screen, when they login to the platform.

Identity and authentication

User authentication needed
User authentication
2-factor authentication
Access restrictions in management interfaces and support channels
All system access is permission based. The process for assigning and changing user permissions will be agreed as part of the implementation.
Access restriction testing frequency
At least once a year
Management access authentication
2-factor authentication

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
I-Procures, Information Security Management System (ISMS) has processes for all governance and security aspects, including staff training, data protection, data transfer, hardware and access procedures.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
I-Procure and its supporting infrastructure is governed by a strict change control policy and procedure. These controls are audited by a SSAE 16 audit to validate our operating effectiveness. Changes are assigned a risk category and are tested thoroughly by following a formal testing methodology.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
I-Procure conducts internal and external weekly vulnerability scans. Vulnerabilities are rated on criteria, e.g. internally/externally facing, age, ease of exploitation, etc. The rating determines the correct active to be taken.

Our security team scans for internal, external, credentialed and non-credentialed vulnerabilities and delivers a list of vulnerabilities with a defined risk level. Our IT team patches systems based on vendors' patch cycles throughout their lifetime. Once our security team communicates vulnerabilities, the IT team works to remediate, testing in the staging infrastructure when possible, and deploying during the next suitable window.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
I-Procure follows NIST Incident Response Lifecycle for security incidents, whereby, known vulnerabilities and secure configurations are scanned to identify any potential weaknesses.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
I-Procure follows NIST Incident Response Lifecycle for security incidents, whereby, known vulnerabilities and secure configurations are scanned to identify any potential weaknesses.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks


£175 to £250 per licence per month
Discount for educational organisations
Free trial available
Description of free trial
Customers will be given full access to the I-Procure platform for a period of 30 days for FREE.

After 30 days, customers will be required to pay an annual license fee.

Service documents

Return to top ↑