Whitehall Finance Limited

Supply Chain Finance and Treasury Management

Whitehall Finance provides a solution to enable you to offer early payment to your suppliers. We can provide a finance a facility and/or a way for you to obtain a return on surplus cash that you would otherwise place on deposit with your bank.

Features

  • Finance facility
  • Dynamic Discounting
  • Early payment solution for your supplier
  • Treasury management by paying suppliers early

Benefits

  • Management of working capital
  • Can be used as a finance facility
  • Can be used to obtain discounts from suppliers
  • Dynamic Discounting

Pricing

£0 to £0 a transaction a month

  • Education pricing available
  • Free trial available

Service documents

Framework

G-Cloud 12

Service ID

3 6 0 7 1 5 0 2 7 2 1 1 0 0 4

Contact

Whitehall Finance Limited

Robert Holland

0203 3690598

Robert.Holland@whitehallfinance.com

Service scope

Software add-on or extension
No
Cloud deployment model
Private cloud
Service constraints
No Constraints
System requirements
No system requirement.

User support

Email or online ticketing support
Email or online ticketing
Support response times
Within 2 Hours during normal business days.
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Yes, at an extra cost
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
Online by logged in users.
Web chat accessibility testing
Not Applicable
Onsite support
No
Support levels
There is no cost for user support which is provided online and by screen sharing.

Support is provided by the operations team.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We provide online training and user documentation.
Service documentation
No
End-of-contract data extraction
CSV Downloads
End-of-contract process
We provide all data as per contract to client without cost.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
As well as the desktop service, we have developed an App that can be used by Suppliers to request early payment of their approved invoices.
Service interface
No
API
No
Customisation available
No

Scaling

Independence of resources
We are using scalable AWS hosting which confirms users are not affected and we will take timely action to upscale

Analytics

Service usage metrics
No

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least once a year
Penetration testing approach
In-house
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
We provide csv download on many screens
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
We intend to provide 99% availability. When the system are down for maintenance users will be notified.

We do all our maintenance before UK standard time or on the weekends.
Approach to resilience
Its AWS clustered hosted environment.
Outage reporting
EmailAlerts

Identity and authentication

User authentication needed
Yes
User authentication
Username or password
Access restrictions in management interfaces and support channels
We have special password mechanism for internal management interfaces and Private key authentication required along with username and password.
Access restriction testing frequency
At least once a year
Management access authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password

Audit information for users

Access to user activity audit information
Users receive audit information on a regular basis
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
Yes
Any other security certifications
Comodo Secure

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
We do so by maintaining proper documentation and following the process where we define what is accessible and by whom.
Information security policies and processes
We do have a catalogue of service documents and controlled by a 30 years experienced resource.
Andrew Howard is our Chief Risk Officer and Chief data Controller.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Continuous Integration is maintained through JIRA board and then we have 5 environments to control the change.

DEV -> TEST ->UAT -> PreProd ->PROD
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
We monitor our servers and see how are where from they are accessed.
We deploy patches every couple of weeks.
We do a tight vigilance on Social media and security networks to know about the things.
Protective monitoring type
Undisclosed
Protective monitoring approach
Not occurred till now.

But we have a process to control these things.
Incident management type
Undisclosed
Incident management approach
- We are regular in touch with our clients on emails and phones.
Users can report incidents by email or phone to assigned managers.
There are no incidents reported till now.

But we can notify users by emails.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Pricing

Price
£0 to £0 a transaction a month
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
There is no cost in any case. We make revenue by charging a transaction fee to the suppliers only when they opt for early payment.

Full Access to platform and Apps for suppliers.

Service documents

Return to top ↑