Beyond Systems Limited

Beyond Auto Sync Oracle Forecasts and Budgets

The Beyond “Auto Sync Oracle Forecasts and Budgets” product automates the process of extracting and loading forecasts and budgets from the Oracle Planning and Budgeting Cloud into Oracle E-Business.


  • Automatically synchronises Oracle PBCS with Oracle E-Business


  • Consolidated source for forecasts/budgets actuals
  • Removes manual effort
  • Saves time and money on manual effort


£15000 per licence per year

Service documents


G-Cloud 11

Service ID

2 8 3 6 6 4 9 6 9 9 8 3 9 5 0


Beyond Systems Limited

Mark Daynes


Service scope

Software add-on or extension
What software services is the service an extension to
This is an extension to Oracle E-Business and Oracle PBCS
Cloud deployment model
Private cloud
Service constraints
Constrained by the availability of Oracle PBCS which can have planned maintenance arrangements.
System requirements
Oracle E-Business

User support

Email or online ticketing support
Email or online ticketing
Support response times
During working hours Mon-Fri 9.00 -17.00 - questions are acknowledged same day. Response times are rolled forward to the next working day if raised at weekends.
User can manage status and priority of support tickets
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Onsite support
Yes, at extra cost
Support levels
For all applications Beyond will provide a basic level of software support during business hours (excluding public holidays and the period between Christmas Day and New Years’ Day), Monday to Friday, 9.00am – 5.00pm.
The customer will be expected to provide 1st line support and a documented scenario will need to be produced and reported to Beyond for investigation. Should the customer spawn a fault investigation that is subsequently not proven not be a software error, then Beyond reserve the right to charge for that time consumed to aid the customer investigation.
Support available to third parties

Onboarding and offboarding

Getting started
At the start of the engagement there is a one off on-boarding/implementation process. A feasibly study will be carried out prior to the engagement to ensure the customer setup is compatible with our software and a custom on-boarding plan will be built. Operator training included as part of the on-boarding service. User documentation is provided.
Service documentation
Documentation formats
End-of-contract data extraction
There is no data to extra as this is a transport data mechanism.
End-of-contract process
At the end of the contract we will require access to remove the software from the relevant environments which is included in the contract price.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Firefox
  • Chrome
Application to install
Compatible operating systems
Linux or Unix
Designed for use on mobile devices
Service interface
Description of service interface
Screen in Oracle E-Business to schedule this interface.
Accessibility standards
Accessibility testing
Oracle regularly conducts testing to ensure that the user interfaces are perceivable, operable and understandable by people with range of abilities. Continually testing coding, visual operation, manual operations, too-assisted operations across people with and without disabilities.
What users can and can't do using the API
Users can control the API through an Oracle concurrent request which allows them to schedule refreshes from Oracle PBCS into Oracle E-Business.
API documentation
API documentation formats
API sandbox or test environment
Customisation available


Independence of resources
The application runs on the customers own machine so ultimately the customer is in control of system resources and they control the resources that affect this process.


Service usage metrics


Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
Datacentre security standards
Managed by a third party
Penetration testing frequency
Protecting data at rest
  • Physical access control, complying with another standard
  • Other
Other data at rest protection approach
The data resides on the customers own machines and network so they will be responsible for protecting the data at rest.
Data sanitisation process
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
There is no data export requirement
Data export formats
Other data export formats
Not applicable
Data import formats
Other data import formats
Not applicable

Data-in-transit protection

Data protection between buyer and supplier networks
Other protection between networks
The product does not use our network, only the buyers network
Data protection within supplier network
Other protection within supplier network
The product does not use our network, only the buyers network

Availability and resilience

Guaranteed availability
The service is available 24 hours per day however the customer is responsible for scheduling the availability once the product has been installed. Where necessary, Service Levels and outcomes will be agreed with the customer prior to any engagement. Under such circumstances, we would be happy to discuss Financial Recompense Models.
Approach to resilience
Available on request
Outage reporting
Email alerts and/or telephone calls to impacted customers

Identity and authentication

User authentication needed
User authentication
Username or password
Access restrictions in management interfaces and support channels
Access is restricted in Oracle E-Business by roles to ensure only those authorised can access the system.
Access restriction testing frequency
At least every 6 months
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Access to supplier activity audit information
Users receive audit information on a regular basis
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance approach
Our security governance aims to be compliant with ISO:27001:2013
Information security policies and processes
Beyond have a written security policy available on request.

Security roles are assigned to specific individuals with their defined responsibilities, including access security as well as the network.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
All change is governed by a Change Management Board.
A configuration and change management log tracks all changes needed and the reason, plus the person responsible for making the change. All change must be approved by our Project Manager and this approval date is recorded in the configuration log. All technical changes are controlled by source control system so we are able track any change that has triggered an error.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Monitoring and assessment is a continual process and we deploy counter measures before potential threats arise.

We work closely with Oracle who advise of potential threats and patches as they are identified.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Monitoring and assessment is a continual process. We work closely with Oracle who advise on any potential threats when they arise.

All potential compromises are dealt with as urgent and requiring immediate assessment and resolution.
Incident management type
Supplier-defined controls
Incident management approach
At the start of the engagement the incident management process is agreed with the customer along with how they wish to report incident as well as how they wish reports to be issued to them.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks


£15000 per licence per year
Discount for educational organisations
Free trial available

Service documents

Return to top ↑