I-Procure - Procurement Management Software
I-Procure has been developed to plug the gap within the existing procurement management software market by providing the tools for effective procurement management.
Features
- Web-based technology application
- Project management of all re-procurements and new procurement projects
- Identification of Enterprise, Category & Individual performance
- Contract's Risk Management
- 24/7 service with dedicated account staff and specialist consultants
- Real-time management information
- Supplier Management module - PCR 2015 DPS Compliant
- User mobile app
Benefits
- Target and record savings targets
- Manage slippage
- Gain Greater visibility and control
- Central Contract's database
- Process efficiencies
- Greater Insight & Intelligence
Pricing
£175 to £250 a licence a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at enquiries@i-procuretech.com.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 11
Service ID
2 7 5 7 6 3 5 3 1 2 6 9 4 1 6
Contact
I-Procure Technology Limited
Andrew Weston
Telephone: 0781 089 8210
Email: enquiries@i-procuretech.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
-
I-Procure operates a pre-planned comprehensive maintenance schedule. Customers will be notified of any system downtime.
Constraints include software access via approved browsers only, which is subject to quarterly updates without notification - System requirements
-
- Buyers need to purchase a software license from I-Procure
- Access to the Internet
User support
- Email or online ticketing support
- Yes, at extra cost
- Support response times
- When raising tickets, users complete a series of questions, which enables I-Procure to assign each ticket a priority rating. Priority Level 1: The technology is ‘down’/inaccessible. Priority Level 2: Operation of the technology is severely degraded. Priority Level 3: Certain non-essential features of the technology are impaired. Priority Level 4: Low priority queries – Password resets I-Procure operates a 24-7 Help Desk, who will look to resolve all Priority Level, 3, 2 and 1 issues within 2 business days, 1 business day and within 2 hours respectively. All Priority Level 4 issues will be sent to our Customer's to resolve
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AAA
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Yes, at an extra cost
- Web chat support availability
- 9 to 5 (UK time), 7 days a week
- Web chat support accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web chat accessibility testing
- Audio: We use sound to improve user accessibility. When a user receives a new message or their place in the que moves up, we signal this with a particular sound. Aria-label: Our web-chat uses aria-labels on elements that don't have enough descriptive text For example: ‘Close the webchat’ is better than ‘Close
- Onsite support
- Yes, at extra cost
- Support levels
-
1st line customer support
Any issues/faults with I-Procure which are defined as:
Severity Level 1 - the platform is down or inaccessible or
Severity Level 2 - the operation of the platform is severely degraded, or non-business critical components of the service are not operational should be escalated to I-Procure's 1st line support team either by telephone or via the platform (subject to availability). I-Procure will look to resolve all Severity Level 1 or 2 issues within the following timeframes:
Severity Level 1: 2 hours
Severity Level 2: Within 1 business day
All system support is covered within the license fee payable by customers. Individual or Team license customers will receive email support only. Enterprise license customers will receive telephone support on top of email support. Telephone support will be available Monday-Friday, 9am to 5pm. Enterprise customers will be provided with their own dedicated technical account manager. - Support available to third parties
- No
Onboarding and offboarding
- Getting started
-
I-Procure incorporates a series of built-in wizards and templates which make using the software, simple, easy and straight forward for users. Customers can upload their entire contract or project database into the software within a matter of seconds.
The platform also includes a help-library and tutorials that are designed to support and encourage self-learning. Customers can request training from I-Procure either over the web or face to face for an additional cost. - Service documentation
- Yes
- Documentation formats
-
- HTML
- ODF
- End-of-contract data extraction
-
At the end of any contract period, I-Procure will provide all platform users with sufficient time, during which they will still be able to login to the platform and complete any necessary actions/transactions.
We will not charge customers a fee for exiting a contract.
We propose passwords for Senior platform users remain active for a period of 30 days after conclusion of contact, and 14 days for all other platform users.
I-Procure will create a denormalised SQL server database with all user, company and transactional data, which will be provided to customers on an encrypted disc. - End-of-contract process
- Upon receipt of notification from a customer that they wish to terminate and/or not extend their contract with I-Procure, all data will be transferred back to the customer in a format agreed during the exit process.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 8
- Internet Explorer 9
- Internet Explorer 10
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
-
I-Procure has not developed an app.
Customers can however access the platform via the web-browser on their phone. - Service interface
- No
- API
- Yes
- What users can and can't do using the API
- I-Procures API Gateway enables us to configure connections to any third party system so that our customers can integrate to any other systems that support API connections
- API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
Customers are able to customise the I-Procure platform in a number of ways:
- Add their logo, change colour screen
- Restrict which users have access to the platform and their permission
levels
- Hide Menu Screens and Tabs
System admin users will be able to make the above customisations. We will provide this training during the initial set-up phase.
Scaling
- Independence of resources
-
Each customer will be provided with their own instance of the I-Procure platform that they will be able to customise accordingly.
I-Procure will ensure secure, reliable network performance for all customers.
From a technical support perspective, customers will be provided with be assigned a dedicated technical support account manager.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
I-Procure can provide customers on request, with management information pertaining to system usage.
Customers will be able to view and manage within the platform itself, the issue and allocation of platform licenses, based on the current usage of the platform by users. - Reporting types
-
- Real-time dashboards
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2012
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
- Physical access control, complying with SSAE-16 / ISAE 3402
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Users may export their data via the reporting section of the tool, into a series of pre-defined Microsoft Excel reporting formats.
- Data export formats
- Other
- Other data export formats
- Microsoft Excel
- Data import formats
- Other
- Other data import formats
- Microsoft Excel
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
-
I-Procure will aim to provide customers with a 24/7 accessible service, excluding emergency maintenance windows (if taken during hours of 5am-8am GMT) weekly maintenance windows, and extended maintenance windows.
We would look to provide customers a system uptime of greater than 95%. Failure to achieve this, will result in customers being provided with service credits. - Approach to resilience
- Available on request.
- Outage reporting
-
Email Alerts.
Customers will receive email alerts notifying them of any system outages, whether planned or unexpected. In relation to planned outages, these will be communicated to customers on their home screen, when they login to the platform.
Identity and authentication
- User authentication needed
- Yes
- User authentication
- 2-factor authentication
- Access restrictions in management interfaces and support channels
- All system access is permission based. The process for assigning and changing user permissions will be agreed as part of the implementation.
- Access restriction testing frequency
- At least once a year
- Management access authentication
- 2-factor authentication
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- I-Procures, Information Security Management System (ISMS) has processes for all governance and security aspects, including staff training, data protection, data transfer, hardware and access procedures.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- I-Procure and its supporting infrastructure is governed by a strict change control policy and procedure. These controls are audited by a SSAE 16 audit to validate our operating effectiveness. Changes are assigned a risk category and are tested thoroughly by following a formal testing methodology.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
I-Procure conducts internal and external weekly vulnerability scans. Vulnerabilities are rated on criteria, e.g. internally/externally facing, age, ease of exploitation, etc. The rating determines the correct active to be taken.
Our security team scans for internal, external, credentialed and non-credentialed vulnerabilities and delivers a list of vulnerabilities with a defined risk level. Our IT team patches systems based on vendors' patch cycles throughout their lifetime. Once our security team communicates vulnerabilities, the IT team works to remediate, testing in the staging infrastructure when possible, and deploying during the next suitable window. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- I-Procure follows NIST Incident Response Lifecycle for security incidents, whereby, known vulnerabilities and secure configurations are scanned to identify any potential weaknesses.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- I-Procure follows NIST Incident Response Lifecycle for security incidents, whereby, known vulnerabilities and secure configurations are scanned to identify any potential weaknesses.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Pricing
- Price
- £175 to £250 a licence a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
-
Customers will be given full access to the I-Procure platform for a period of 30 days for FREE.
After 30 days, customers will be required to pay an annual license fee.
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at enquiries@i-procuretech.com.
Tell them what format you need. It will help if you say what assistive technology you use.