StockAssist Inventory Management
Cloud hosted inventory management solution
- Real-time inventory management
- GS1 Certified
- Cloud hosted
- HIBC Compliant
- Utilise Barcodes or RFID tags
- Offline mode
- Label printing
- Reduce overheads
- Manage stock rotation
- Remove the use of expired products
- Batch number tracking
- Serial number tracking
- Manage stock levels on the move
- Improve profitability
£1200 per instance per year
3 6 7 0 7 4 5 3 3 5 4 4 5 1 7
01786 349 350
|Software add-on or extension||No|
|Cloud deployment model||Public cloud|
StockAssist integrates at a low level with mobile computing hardware to ensure the best possible user experience.
Currently many major manufacturers are covered, with the list or supported devices growing.
|System requirements||Android mobile computers with integrated barcode scanners|
|Email or online ticketing support||Email or online ticketing|
|Support response times||All support tickets are responded to within 4 hours, during normal UK office hours.|
|User can manage status and priority of support tickets||Yes|
|Online ticketing support accessibility||None or don’t know|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||No|
|Onsite support||Onsite support|
On-site installation and training are provided for all new implementations.
Following installation, off-site telephone and e-mail support is provided, utilising an MDM solution to enable off-site support of mobile devices.
Additional on-site support is available at additional cost.
As we are a small organisation, there is currently no requirement to assign a specific account manager to each customer.
|Support available to third parties||No|
Onboarding and offboarding
|Getting started||We provide on-site installation and training for all new users. On-line help and training documents are accessible to all users.|
|End-of-contract data extraction||Users can export all data from the database automatically.|
|End-of-contract process||Users can export all data required themselves. If additional processing or formatting is required, KMsoft can supply a CSV or excel file in agreed format.|
Using the service
|Web browser interface||Yes|
|Application to install||Yes|
|Compatible operating systems||
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||
All stock movements are carried out using a mobile device with integrated barcode scanner. The StockAssist app must be installed on this device.
System reporting and administration is browser based, and would normally be carried out using a desktop device.
|What users can and can't do using the API||The API interfaces with external systems to allow sales orders, or picklists to be passed to StockAssist and displayed on-screen for the storeman.|
|API documentation formats|
|API sandbox or test environment||Yes|
|Description of customisation||
StockAssist is fully configurable to work with single or multiple sites. The Batch mode software allows off-premise use, where there is limited connectivity available.
Additional customisation can be done by our development team as required.
|Independence of resources||StockAssist utilises Microsoft Azure for hosting. This allows the application to scale or multiply as required when a load is placed on it.|
|Service usage metrics||Yes|
|Metrics types||Reports within the package show use of the system. These can be generated by the user.|
|Supplier type||Not a reseller|
|Staff security clearance||Staff screening not performed|
|Government security clearance||None|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||United Kingdom|
|User control over data storage and processing locations||Yes|
|Datacentre security standards||Managed by a third party|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||Another external penetration testing organisation|
|Protecting data at rest||Physical access control, complying with another standard|
|Data sanitisation process||No|
|Equipment disposal approach||In-house destruction process|
Data importing and exporting
|Data export approach||Custom reports can be generated within StockAssist to show any required data, then exported as a CSV or excel file.|
|Data export formats||CSV|
|Data import formats||CSV|
|Data protection between buyer and supplier networks||TLS (version 1.2 or above)|
|Data protection within supplier network||IPsec or TLS VPN gateway|
Availability and resilience
|Guaranteed availability||StockAssist has a 99% SLA. If the system does not meet the guaranteed levels of availability, users are refunded a percentage of their subscription fee for the downtime.|
|Approach to resilience||StockAssist utilises Microsoft Azure datacentres.|
|Outage reporting||Service outages are reported by e-mail to the system administrator.|
Identity and authentication
|User authentication needed||Yes|
|User authentication||Username or password|
|Access restrictions in management interfaces and support channels||Generally username & password access is requested by our clients (we can force complex passwords if required). If 2-factor authentication is required, this can also be enabled, but is usually not required by our clients.|
|Access restriction testing frequency||At least every 6 months|
|Management access authentication||
Audit information for users
|Access to user activity audit information||Users have access to real-time audit information|
|How long user audit data is stored for||At least 12 months|
|Access to supplier activity audit information||Users contact the support team to get audit information|
|How long supplier audit data is stored for||At least 12 months|
|How long system logs are stored for||At least 12 months|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||No|
|Named board-level person responsible for service security||Yes|
|Security governance certified||No|
|Security governance approach||
Authorised access to the system is controlled by a system administrator appointed by the client.
KMsoft actively maintain the security of the system by working with leading cyber security educational establishments and regularly monitor system logs for unauthorised access.
|Information security policies and processes||All security details are controlled by the company directors and only when specifically required are they passed to employees. Once access is complete, credentials are updated.|
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||All changes are discussed and signed off by the board, and if required with the client before implementation. A change log is created for each update, and stored in our version control system.|
|Vulnerability management type||Supplier-defined controls|
|Vulnerability management approach||
We work with cyber security experts who carry out ethical hacking audits to ensure that the system remains secure.
Any potential threats discovered are mitigated as soon as possible.
|Protective monitoring type||Supplier-defined controls|
|Protective monitoring approach||
We utilise the tools provided by our hosting to monitor traffic and identify potential compromises.
If a potential compromise is discovered, the client is informed immediately, the system is locked down to prevent any further access, and an off-line backup of the data created immediately.
Incidents are responded to as soon as we are aware of them.
|Incident management type||Supplier-defined controls|
|Incident management approach||We manage incidents on a case-by-case basis as required by the company directors.|
|Approach to secure software development best practice||Supplier-defined process|
Public sector networks
|Connection to public sector networks||No|
|Price||£1200 per instance per year|
|Discount for educational organisations||No|
|Free trial available||No|