Swiss Post Solutions

Swiss Post Solutions E-Billing and E-Invoicing

E-billing replaces manual or paper-based billing processes with an electronic billing portal that delivers invoices and statements instantly and provides on-line, on-demand access for clients.

Features

  • Cloud based portal
  • Raising and creation of invoice
  • Instant delivery of invoice/statement
  • Proof of invoice delivery
  • Semi-automated query management
  • Automated overdue reminders/payment letters
  • Payment receipt and allocation
  • Live status information visible to customers

Benefits

  • 80% of companies achieve ROI within six months of implementation
  • Fast easy switching (4-6 weeks) with virtually zero costs
  • >80% reduction in cost per invoice and reduced collection costs
  • 10% reduction in days sale outstanding and improved working capital
  • Fewer requests for copy invoices
  • No changes to existing finance systems
  • More informed payment chasing and dispute handling
  • Enhanced experience and less administration and associated costs for clients
  • More secure and auditable process
  • 98% reduction in carbon footprint

Pricing

£1000 to £10000 per licence per month

Service documents

Framework

G-Cloud 11

Service ID

4 1 7 2 7 5 3 9 7 3 2 5 8 5 3

Contact

Swiss Post Solutions

Brett Champion

07909 996860

brett.champion@swisspost.com

Service scope

Software add-on or extension
No
Cloud deployment model
Private cloud
Service constraints
At this time, there are no foreseen service constraints that buyers should know about.
System requirements
Users have anti-virus Softare installed on their devices

User support

Email or online ticketing support
Email or online ticketing
Support response times
Dependent on client requirements
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
No
Support levels
We have a Service Centre (Help Desk) included as part of our service. The normal operating hours of our Service Centre are 8am to 6pm but clients have the ability to submit a query/ticket between 7am and 8am via our online Service Centre Plus online system. Anything received between 7am and 8am will be picked up by the Help Desk staff at 8am. Should this not be sufficient, we are happy to look at bespoke options for specific clients. Our support engineers are on hand to assit users with a range of queries and tickets are raised for all queries which are monitored to resolution. Oher than our Service Centre Plus online system, support queries can also be sent in by email, phone or fax.
Support available to third parties
No

Onboarding and offboarding

Getting started
All chosen Users of the Service will be provided with their own login/Service Access Credentials. SPS adopts the train-the-trainer approach to product training. User guides will also be provided.
Service documentation
No
End-of-contract data extraction
A specific Data extraction plan will be planned and agreed with the customer. Depending on the agreed data extraction plan, will depend on the method of data extraction. All data extraction methods are secure and inline with ISO27001 procedures.
End-of-contract process
Exit fee's will be discussed and agreed with the client on each contractual basis before contract signature. Depending on the clients requirements regarding Contract exit and termination, will depend on what happens at the end of the contract

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Firefox
Application to install
No
Designed for use on mobile devices
No
Service interface
No
API
No
Customisation available
Yes
Description of customisation
All customisations of all SPS Services will be explored and agreed with the buyer prior to contract. Client themselves are unable to make ad-hoc customisation with SPS' Solutions

Scaling

Independence of resources
SPS has invested heavily into all its services to ensure the system capacities are built and designed to manage and operate whilst large volumes of users are accessing and using the system.

Analytics

Service usage metrics
Yes
Metrics types
Yes, we provide full Management Information reporting. We record detailed information to provide comprehensive qualitative and quantitative MI reporting. Reports are typically periodic and are emailed directly to authorised requesting users.
Reporting types
  • Real-time dashboards
  • Regular reports

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
European Economic Area (EEA)
User control over data storage and processing locations
No
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
Other
Other data at rest protection approach
Other - Customer authored Data is encrypted at rest for all cloud services. When hard disks are taken out of service they are demagnetised and destroyed on site. Our sites are accredited annually to ISO27001.
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Data can be exported by clients to us in various ways including SFTP or physical media
Data export formats
Other
Other data export formats
SFTP
Data import formats
Other
Other data import formats
SFTP

Data-in-transit protection

Data protection between buyer and supplier networks
Other
Other protection between networks
This will depend on the agreed transfer method. It can be encrypted or secured in another fashion which will be agreed with the client
Data protection within supplier network
Other
Other protection within supplier network
Supplier-Defined process audited and certified to ITHC standard.

Availability and resilience

Guaranteed availability
SPS meets target service levels set at between 99.6% and 100%. We can provide details of SLA and service level credits are agreed with clients on a case by case basis
Approach to resilience
Available on request
Outage reporting
Email alerts from the SPS Support Team.

Identity and authentication

User authentication needed
Yes
User authentication
Username or password
Access restrictions in management interfaces and support channels
Username and password as well as authorisation levels are assigned to all users of the system.Allowing users with higher level of authority to access management interfaces and support channels
Access restriction testing frequency
At least once a year
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
SGS
ISO/IEC 27001 accreditation date
16/09/2016
What the ISO/IEC 27001 doesn’t cover
Information Security relating to hardware, Software, LAN and WAN management, documentation including paper based and digital Customer communications for client facing information, client owned and supplied information and internal processing facilities relating to the provision of central mail rooms including customer locations, document processing centres and head office activities.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
SPS policies and processes are in line with ISO 27001 accreditation. SPS security policies include;
- Information Security Policy
- Data Protection Policy
- Encryption policy
- Password Policy
- Physical Security policy
- Incident Management and improvement process

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
SPS’ approach to Solution configuration and Risk management is built on recognised principles of change management and is again closely aligned with the principles of PRINCE2. SPS’ risk assessment and change management process ensures that there are regular reviews of any potential risks during the development pipeline of the solution and at the very least a one-time review of risks associated with any changes made to the solution throughout its lifetime. From this review, necessary preventive and / or contingency actions will be identified and passed to detailed work planning, including an update of the solution pipeline.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
The compliance team within SPS are responsible for the internal auditing of all processes and procedures. This includes undertaking with our information security manager information security risk assessments and risk treatment plans, looking at all critical assets and processes, alongside a Business Impact Assessment and BC Risk Assessment a Business, looking at critical business systems and processes. This is all then followed up by internal and external audits covering all parts of the certificated standards to ensure that SPS is working to their own internal processes and controls and we are able to maintain 9001, 14001, 27001 certifications.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
The respective asset owners are responsible for arranging for the controls to be implemented effectively; this would typically include defining the controls in policies and/or procedures, so that they can become part of everyday business practice. Asset owners are responsible also for the management of any risks which are not specifically addressed in the Risk Assessment. The SPS Risk Assessment and Risk Treatment plan document is structured by using the Asset List to identify the threats to each asset. Each threat and consequent risk is quantified. We further analyse this information for all significant risks and their respective controls.
Incident management type
Supplier-defined controls
Incident management approach
SPS' procedure provides guidance on the handling of security incidents, breaches or suspected incidents and breaches.This policy applies to all SPS systems and sites and to all SPS staff, temps, contractors and third parties working on behalf of SPS. Once the incident has been identified and contained, efforts can then be focused on finding an appropriate solution. The fundamental features of any solution should be investigation, action and follow-up/record-keeping; the order in which they are implemented depends upon the nature of the incident.
The Services Director, assisted by the Compliance manager, will initiate the appropriate investigation.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Pricing

Price
£1000 to £10000 per licence per month
Discount for educational organisations
No
Free trial available
No

Service documents

Return to top ↑