Whitehall Finance Limited

Supply Chain Finance and Treasury Management

Whitehall Finance provides a solution to enable you to offer early payment to your suppliers. We can provide a finance a facility and/or a way for you to obtain a return on surplus cash that you would otherwise place on deposit with your bank.


  • Finance facility
  • Dynamic Discounting
  • Early payment solution for your supplier
  • Treasury management by paying suppliers early


  • Management of working capital
  • Can be used as a finance facility
  • Can be used to obtain discounts from suppliers
  • Dynamic Discounting


£0 to £0 a transaction a month

  • Education pricing available
  • Free trial available

Service documents


G-Cloud 12

Service ID

3 6 0 7 1 5 0 2 7 2 1 1 0 0 4


Whitehall Finance Limited

Robert Holland

0203 3690598


Service scope

Software add-on or extension
Cloud deployment model
Private cloud
Service constraints
No Constraints
System requirements
No system requirement.

User support

Email or online ticketing support
Email or online ticketing
Support response times
Within 2 Hours during normal business days.
User can manage status and priority of support tickets
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Yes, at an extra cost
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
Online by logged in users.
Web chat accessibility testing
Not Applicable
Onsite support
Support levels
There is no cost for user support which is provided online and by screen sharing.

Support is provided by the operations team.
Support available to third parties

Onboarding and offboarding

Getting started
We provide online training and user documentation.
Service documentation
End-of-contract data extraction
CSV Downloads
End-of-contract process
We provide all data as per contract to client without cost.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
As well as the desktop service, we have developed an App that can be used by Suppliers to request early payment of their approved invoices.
Service interface
Customisation available


Independence of resources
We are using scalable AWS hosting which confirms users are not affected and we will take timely action to upscale


Service usage metrics


Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least once a year
Penetration testing approach
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
We provide csv download on many screens
Data export formats
Data import formats

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
We intend to provide 99% availability. When the system are down for maintenance users will be notified.

We do all our maintenance before UK standard time or on the weekends.
Approach to resilience
Its AWS clustered hosted environment.
Outage reporting

Identity and authentication

User authentication needed
User authentication
Username or password
Access restrictions in management interfaces and support channels
We have special password mechanism for internal management interfaces and Private key authentication required along with username and password.
Access restriction testing frequency
At least once a year
Management access authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password

Audit information for users

Access to user activity audit information
Users receive audit information on a regular basis
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications
Any other security certifications
Comodo Secure

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance approach
We do so by maintaining proper documentation and following the process where we define what is accessible and by whom.
Information security policies and processes
We do have a catalogue of service documents and controlled by a 30 years experienced resource.
Andrew Howard is our Chief Risk Officer and Chief data Controller.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Continuous Integration is maintained through JIRA board and then we have 5 environments to control the change.

DEV -> TEST ->UAT -> PreProd ->PROD
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
We monitor our servers and see how are where from they are accessed.
We deploy patches every couple of weeks.
We do a tight vigilance on Social media and security networks to know about the things.
Protective monitoring type
Protective monitoring approach
Not occurred till now.

But we have a process to control these things.
Incident management type
Incident management approach
- We are regular in touch with our clients on emails and phones.
Users can report incidents by email or phone to assigned managers.
There are no incidents reported till now.

But we can notify users by emails.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks


£0 to £0 a transaction a month
Discount for educational organisations
Free trial available
Description of free trial
There is no cost in any case. We make revenue by charging a transaction fee to the suppliers only when they opt for early payment.

Full Access to platform and Apps for suppliers.

Service documents

Return to top ↑