SAP SuccessFactors HR & Payroll Software

The digitalisation of HR and Payroll


  • Scalability - Cloud infrastructure can scale on demand
  • Flexibility - Users can scale services to fit their needs
  • Ability to manage and control costs
  • Rapid Deployment
  • Data storage options


  • Cost effectiiveness
  • Time to Value
  • Easy compliance management
  • Automated Updates
  • Extensibility
  • Improved Enagagement
  • Improved employee performance
  • Mobility and Usage


£3.44 per user

  • Education pricing available

Service documents


G-Cloud 11

Service ID

3 8 1 4 6 1 7 4 5 6 1 7 7 2 7



Andy Hodges


Service scope

Software add-on or extension
Cloud deployment model
Public cloud
Service constraints
As a cloud based solution you can configure it many ways to make it customer specific, but cannot bespoke the core platform.
System requirements
SAP Subscription Licences

User support

Email or online ticketing support
Email or online ticketing
Support response times
Support response times
No - 24 Hour Support/ 7 Days a week
User can manage status and priority of support tickets
Online ticketing support accessibility
None or don’t know
Phone support
Phone support availability
24 hours, 7 days a week
Web chat support
Onsite support
Onsite support
Support levels
Gavdi shall deliver a support setup consisting of three support levels as follows: Level-2 Being responsible for tickets requiring qualifications in the deployed solution corresponding to those of a Super User Level-3 Being responsible for tickets requiring qualifications in the deployed solution corresponding to those of a skilled functional SAP HCM consultant Level-4 Being responsible for tickets requiring qualifications in the deployed solution corresponding to those of a skilled Solution architect and/or technical consultant
Support available to third parties

Onboarding and offboarding

Getting started
We provide onsite training, online training and user documentation.
The level of support depends on the contractual agreement.
Service documentation
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
All data is hosted by the supplier - SAP. As a SaaS based offering SuccessFactors provide full technical support and maintenance of the systems within their data centres. All data can be extracted into external files using report and built-in export tools.
End-of-contract process
Every customer contract is treated on an individual basis. Customer notified of expiring contract and next steps to be agreed per requirements.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Compatible operating systems
  • Android
  • IOS
  • Linux or Unix
  • MacOS
  • Windows
  • Windows Phone
Designed for use on mobile devices
Differences between the mobile and desktop service
Usability and Accesibility
Service interface
Description of service interface
SAP delivers an exceptional user experience with SAP SuccessFactors. There UX is based on how people actually engage with technology on the Web and mobile devices. It’s flexible, easy, and people-centric – and feels tailored to each and every employee
Accessibility standards
None or don’t know
Description of accessibility
SAP SuccessFactors solutions are delivered on the Web and through native mobile apps. Our UX is consistent on both platforms – and across solutions. Access everything you need from a single interface, and easily pick up where you left off on a different device.

Intuitive, consumer-grade UX
Adaptable to different personas
Clean and simple login
Quick start with homepage tiles
Easy search functionality
Continuous UX across solutions

No real constraints
Accessibility testing
What users can and can't do using the API
At a product level - full range of functionalities via API user acess controlled used based permissions.
Changes made through user based permissions.
No limitations Prebuilt content on SuccessFactors Platform
API documentation
API documentation formats
API sandbox or test environment
Customisation available
Description of customisation
Products can be preconfigured to meet user needs or requirements.
Customisation can be done by suppliers.


Independence of resources
Scales automatically. Contractually SuccessFactors systems are available for 99.5% of the time.


Service usage metrics
Metrics types
Infrastructure or application metrics
Reporting types
Regular reports


Supplier type
Reseller providing extra features and support
Organisation whose services are being resold

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
European Economic Area (EEA)
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
Protecting data at rest
Encryption of all physical media
Data sanitisation process
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Data is extracted with the use of various reporting tools - Supported by user based roles.
Data export formats
Data import formats

Data-in-transit protection

Data protection between buyer and supplier networks
Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
The SuccessFactors platforms are contractually available to customers for 99.5% of the time. Any potential refunds would be managed on a case by case basis directly with SAP.
Approach to resilience
There is a failover to a recognised data centre in Europe.
Further information is available from SAP SuccessFactors
Outage reporting
All data centre outages are reported via emails to designated customer contacts and through the customer support portal you can view dashboards on service stats and availability.

Identity and authentication

User authentication needed
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password
  • Other
Other user authentication
Granting system access whether through direct access for business users, support personnel or via interfaces is under the direct control of the authorized administrator.
Access restrictions in management interfaces and support channels
Access is restricted by role based permissions
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
How long system logs are stored for

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications
Any other security certifications
  • Personal Information Management System –BS 10012:2017
  • ISO/IEC 9001 Quality Management System
  • ISO22301 Business Continuity Management System

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
All of our security policies are strictly aligned to ISO27001 Standards. Our Consultants access our SuccessFactors customers' systems via secure https connections that require a unique user ID and password. All email communications are encrypted and secured.

Our Chief Information Officer is Lars Kramer.
He and his team ensure that our users adhere to Gavdi security policies and procedures.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
SAP SuccessFactors applies all changes to its Hosted Infrastructure, whether planned or unplanned, with a formal Change Management policy in place. This ensures that all planned product updates, planned and unplanned defect corrections, and planned and unplanned security patches do not adversely impact the customer experience. Every change to a SuccessFactors Information Resources resource such as: operating systems, computing hardware, networks, applications, and databases is subject to the Change Management.
All changes are assesed for potential security impact.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Vulnerability Scanning and Penetration testing is conducted regularly. SAP has Event, Incident, Threat and Vulnerability Management in place.
(SAP Cloud Security Framework 3.5 Event, Incident, Threat and Vulnerability Management, SOC 2).
SAP has policy and standard in place to ensure confidentiality, security, availability, processing integrity, and privacy. Data center certifications include ISO27001, and PCI-DSS compliance.
(SAP Cloud Security Framework 3 - Information Security and Data Protection)
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
SAP takes a holistic approach to information security, implementing a multi-layered defense at all the touch points in the information flow—both the physical and logical, applied across the database, middleware, application, and network and communication layers—to offer complete data privacy, transparency, and audit controls.
SAP performs risk assessment on our system at least yearly or whenever there is an identified threat or vulnerability. SAP also performs periodic risk assessments to address changes in systems and processing environment including changes in policies, technologies, laws, and regulations.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
All Security Incidents are submitted, via SAP Support as described above to formal event reporting and SAP follows escalation procedures based upon nature and scope of an incident if an information Security Incident occurs. SAP leverages the Security Incident management process to enable the restoration of normal service operation as fast as possible, to minimize adverse impact on business operations, and to quickly control vulnerabilities.
The SAP Security Incident management process is aligned with ISO/IEC 27035 principles. Security Incidents are monitored and tracked by security specialists in cooperation with defined communication channels until resolved.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
Connected networks
Public Services Network (PSN)


£3.44 per user
Discount for educational organisations
Free trial available

Service documents

Return to top ↑