SAP SuccessFactors HR & Payroll Software
The digitalisation of HR and Payroll
- Scalability - Cloud infrastructure can scale on demand
- Flexibility - Users can scale services to fit their needs
- Ability to manage and control costs
- Rapid Deployment
- Data storage options
- Cost effectiiveness
- Time to Value
- Easy compliance management
- Automated Updates
- Improved Enagagement
- Improved employee performance
- Mobility and Usage
£3.44 per user
- Education pricing available
|Software add-on or extension||No|
|Cloud deployment model||Public cloud|
|Service constraints||As a cloud based solution you can configure it many ways to make it customer specific, but cannot bespoke the core platform.|
|System requirements||SAP Subscription Licences|
|Email or online ticketing support||Email or online ticketing|
|Support response times||
Support response times
No - 24 Hour Support/ 7 Days a week
|User can manage status and priority of support tickets||Yes|
|Online ticketing support accessibility||None or don’t know|
|Phone support availability||24 hours, 7 days a week|
|Web chat support||No|
|Onsite support||Onsite support|
|Support levels||Gavdi shall deliver a support setup consisting of three support levels as follows: Level-2 Being responsible for tickets requiring qualifications in the deployed solution corresponding to those of a Super User Level-3 Being responsible for tickets requiring qualifications in the deployed solution corresponding to those of a skilled functional SAP HCM consultant Level-4 Being responsible for tickets requiring qualifications in the deployed solution corresponding to those of a skilled Solution architect and/or technical consultant|
|Support available to third parties||Yes|
Onboarding and offboarding
We provide onsite training, online training and user documentation.
The level of support depends on the contractual agreement.
|End-of-contract data extraction||All data is hosted by the supplier - SAP. As a SaaS based offering SuccessFactors provide full technical support and maintenance of the systems within their data centres. All data can be extracted into external files using report and built-in export tools.|
|End-of-contract process||Every customer contract is treated on an individual basis. Customer notified of expiring contract and next steps to be agreed per requirements.|
Using the service
|Web browser interface||Yes|
|Application to install||Yes|
|Compatible operating systems||
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||Usability and Accesibility|
|Accessibility standards||None or don’t know|
|Description of accessibility||
SAP SuccessFactors solutions are delivered on the Web and through native mobile apps. Our UX is consistent on both platforms – and across solutions. Access everything you need from a single interface, and easily pick up where you left off on a different device.
Intuitive, consumer-grade UX
Adaptable to different personas
Clean and simple login
Quick start with homepage tiles
Easy search functionality
Continuous UX across solutions
No real constraints
|What users can and can't do using the API||
At a product level - full range of functionalities via API user acess controlled used based permissions.
Changes made through user based permissions.
No limitations Prebuilt content on SuccessFactors Platform
|API documentation formats|
|API sandbox or test environment||Yes|
|Description of customisation||
Products can be preconfigured to meet user needs or requirements.
Customisation can be done by suppliers.
|Independence of resources||Scales automatically. Contractually SuccessFactors systems are available for 99.5% of the time.|
|Service usage metrics||Yes|
|Metrics types||Infrastructure or application metrics|
|Reporting types||Regular reports|
|Supplier type||Reseller providing extra features and support|
|Organisation whose services are being resold||SAP|
|Staff security clearance||Conforms to BS7858:2012|
|Government security clearance||Up to Developed Vetting (DV)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||European Economic Area (EEA)|
|User control over data storage and processing locations||Yes|
|Datacentre security standards||Complies with a recognised standard (for example CSA CCM version 3.0)|
|Penetration testing frequency||At least every 6 months|
|Penetration testing approach||In-house|
|Protecting data at rest||Encryption of all physical media|
|Data sanitisation process||Yes|
|Data sanitisation type||Explicit overwriting of storage before reallocation|
|Equipment disposal approach||Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001|
Data importing and exporting
|Data export approach||Data is extracted with the use of various reporting tools - Supported by user based roles.|
|Data export formats||CSV|
|Data import formats||CSV|
|Data protection between buyer and supplier networks||Legacy SSL and TLS (under version 1.2)|
|Data protection within supplier network||Legacy SSL and TLS (under version 1.2)|
Availability and resilience
|Guaranteed availability||The SuccessFactors platforms are contractually available to customers for 99.5% of the time. Any potential refunds would be managed on a case by case basis directly with SAP.|
|Approach to resilience||
There is a failover to a recognised data centre in Europe.
Further information is available from SAP SuccessFactors
|Outage reporting||All data centre outages are reported via emails to designated customer contacts and through the customer support portal you can view dashboards on service stats and availability.|
Identity and authentication
|User authentication needed||Yes|
|Other user authentication||Granting system access whether through direct access for business users, support personnel or via interfaces is under the direct control of the authorized administrator.|
|Access restrictions in management interfaces and support channels||Access is restricted by role based permissions|
|Access restriction testing frequency||At least once a year|
|Management access authentication||
Audit information for users
|Access to user activity audit information||Users contact the support team to get audit information|
|How long user audit data is stored for||User-defined|
|Access to supplier activity audit information||Users contact the support team to get audit information|
|How long supplier audit data is stored for||User-defined|
|How long system logs are stored for||User-defined|
Standards and certifications
|ISO/IEC 27001 certification||Yes|
|Who accredited the ISO/IEC 27001||SAP|
|ISO/IEC 27001 accreditation date||31/05/2018|
|What the ISO/IEC 27001 doesn’t cover||N/A|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||Yes|
|Any other security certifications||
|Named board-level person responsible for service security||Yes|
|Security governance certified||Yes|
|Security governance standards||ISO/IEC 27001|
|Information security policies and processes||
All of our security policies are strictly aligned to ISO27001 Standards. Our Consultants access our SuccessFactors customers' systems via secure https connections that require a unique user ID and password. All email communications are encrypted and secured.
Our Chief Information Officer is Lars Kramer.
He and his team ensure that our users adhere to Gavdi security policies and procedures.
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||
SAP SuccessFactors applies all changes to its Hosted Infrastructure, whether planned or unplanned, with a formal Change Management policy in place. This ensures that all planned product updates, planned and unplanned defect corrections, and planned and unplanned security patches do not adversely impact the customer experience. Every change to a SuccessFactors Information Resources resource such as: operating systems, computing hardware, networks, applications, and databases is subject to the Change Management.
All changes are assesed for potential security impact.
|Vulnerability management type||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Vulnerability management approach||
Vulnerability Scanning and Penetration testing is conducted regularly. SAP has Event, Incident, Threat and Vulnerability Management in place.
(SAP Cloud Security Framework 3.5 Event, Incident, Threat and Vulnerability Management, SOC 2).
SAP has policy and standard in place to ensure confidentiality, security, availability, processing integrity, and privacy. Data center certifications include ISO27001, and PCI-DSS compliance.
(SAP Cloud Security Framework 3 - Information Security and Data Protection)
|Protective monitoring type||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Protective monitoring approach||
SAP takes a holistic approach to information security, implementing a multi-layered defense at all the touch points in the information flow—both the physical and logical, applied across the database, middleware, application, and network and communication layers—to offer complete data privacy, transparency, and audit controls.
SAP performs risk assessment on our system at least yearly or whenever there is an identified threat or vulnerability. SAP also performs periodic risk assessments to address changes in systems and processing environment including changes in policies, technologies, laws, and regulations.
|Incident management type||Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402|
|Incident management approach||
All Security Incidents are submitted, via SAP Support as described above to formal event reporting and SAP follows escalation procedures based upon nature and scope of an incident if an information Security Incident occurs. SAP leverages the Security Incident management process to enable the restoration of normal service operation as fast as possible, to minimize adverse impact on business operations, and to quickly control vulnerabilities.
The SAP Security Incident management process is aligned with ISO/IEC 27035 principles. Security Incidents are monitored and tracked by security specialists in cooperation with defined communication channels until resolved.
|Approach to secure software development best practice||Supplier-defined process|
Public sector networks
|Connection to public sector networks||Yes|
|Connected networks||Public Services Network (PSN)|
|Price||£3.44 per user|
|Discount for educational organisations||Yes|
|Free trial available||No|