Continia Document Capture for Microsoft Dynamics 365 Business Central Licences
The best and most comprehensive solution for scanning of invoices and other documents directly from Dynamics 365 Business Central .
Automatic registration of documents, OCR data extraction, an advanced approval workflow, and a full-text searchable digital archive.
Automates all workflow processes from receiving a document to retrieving it again.
Features
- OCR Document Capture
- Document Management
- Document capture and storage
- Business intelligence and reporting
Benefits
- Improve efficiency in your organisation
- Certified Microsoft Gold Partner exertise
- ISO 27001 and Cyber Essentials accredited
Pricing
£200 to £2,000 a unit a month
- Education pricing available
- Free trial available
Service documents
Framework
G-Cloud 12
Service ID
4 9 1 8 6 1 6 4 9 2 9 7 1 4 1
Contact
Total Enterprise Solutions
Andrew Lees
Telephone: 0345 257 1173
Email: andrew.lees@totalenterprisesolutions.co.uk
Service scope
- Software add-on or extension
- Yes
- What software services is the service an extension to
- Microsoft Dynamics 365 Business Central
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- There are no service constraints.
- System requirements
-
- Microsoft Edge
- Google Chrome 77.0 for Windows
- Mozilla Firefox 69.0 for Windows
- Safari 12.0 for macOS
- Internet Explorer 11
- Microsoft Office 365, Microsoft Office 2019, or Microsoft Office 2016
- Windows 10 S, Home, Pro, Enterprise, Education (32-bit and 64-bit)
- Android 6.0 or higher (tablet and phone)
- IOS 10.0 or higher (iPad and iPhone)
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Our response times are linked to our SLA's
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AAA
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 AAA
- Web chat accessibility testing
- Our support portal is ServiceNow is developed with the goal of adhering to the guidelines in WCAG 2.0. With continual testing to ensure that the ServiceNow interface is accessible to users with disabilities.
- Onsite support
- Onsite support
- Support levels
- Our support services are available via our UK based support portal, using the leading ServiceNow service technology to provide a modern approach to customer support. We have strict SLA’s for each of our support case priority, as outlined: Priority 1 – Target Response 10 minutes, Resolution Target 4 hours. Priority 2 – Target Response 30 minutes, Resolution Target 1 day. Priority 3 – Target Response 2 hours, Resolution Target 4 days. Priority 4 – Target Response 2 hours, Resolution Target 7 days. In tandem to our support desk we provide dedicated Account Manager who work with you to get the maximum value from your Microsoft Dynamics investment and develop a roadmap based on upcoming feature releases. Our support desk is completely aligned to ITIL v4 continued service improvement to ensure that we are continually delivering world class services. In addition we send customer satisfaction (CSAT) surveys to get feedback from our customers 'how well we've been doing?'
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
We have a proven methodology to empower users through onsite training.
There are also live webinars, videos, customer source portal and user documentation. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
-
Data can be exported in various electronic devices. We are ISO 27001 certified and are safe handling your data.
We do not store any of your data on our servers. - End-of-contract process
- TES are happy to assist with transitional activities at the end of a contract. This may be chargeable depending on the nature of the work required.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 7
- Internet Explorer 8
- Internet Explorer 9
- Internet Explorer 10
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari 9+
- Opera
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Linux or Unix
- MacOS
- Windows
- Windows Phone
- Other
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Full Microsoft Dynamics information is available via mobile device and desktop service
- Service interface
- No
- API
- Yes
- What users can and can't do using the API
- All areas can be deployed through API
- API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
Agile and adaptable, it lets you manage your business in the way you want, allowing you to easily add extra, industry-specific functionality.
Purchase Order processing
Multi level approvals
Scaling
- Independence of resources
- Microsoft Online Services utilises various Cloud Scale technologies which ensures multi-tenant services are not affected in terms of peak usage.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Regular updates of our support service through ServiceNow.
- Reporting types
-
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Continia
Staff security
- Staff security clearance
- Conforms to BS7858:2012
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- Never
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Other
- Other data at rest protection approach
- ISO 27001
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Data can be imported or exported as required. It can be stored locally or in the Cloud.
- Data export formats
-
- CSV
- ODF
- Other
- Other data export formats
- Data import formats
-
- CSV
- ODF
- Other
- Other data import formats
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- Microsoft Azure commits to guaranteeing at least 99.9% availability of service per month. If Microsoft fails to meet this SLA customers are given service credits based on the following: < 99.99% =10% credit <99% = 25% credit <95% = 100% credit.
- Approach to resilience
- Resilience is built into the application by design consisting of High Availability - Maintaining acceptable continuous performance despite temporary failures in services, hardware, datacenters, or fluctuations in load. Disaster recovery - Protection against loss of an entire region through asynchronous replication for failover of virtual machines and data using services such as Azure Site Recovery and geo-redundant storage (GRS) Backup - Replication of virtual machines and data to one or more regions using Azure Backup. Further detail can be provided upon request.
- Outage reporting
- Public dashboard. Email alerts to the key users/ system administrator via the admin centre.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Password entry
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- BSI
- ISO/IEC 27001 accreditation date
- 31/12/2017
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Other security certifications
- Yes
- Any other security certifications
- Cyber Essentials
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
We have a information security management system implemented under our ISO 27001 certification. This describes multiple policies and adherence to these is assessed through regular management reviews.
This can be evidenced on request.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Configuration and change management processes are described in the ISMS-03-002 process of our Information Security Management System (ISMS) which is available on request. This outlines procedures for change scoping, change advisory board (CAB), risk management and deployment.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- Vulnerability management is described in the ISMS-03-003 Risk Assessment Procedure of our Information Security Management System (ISMS) and is available on request. It outlines how to identify, classify and manage risks in the context of information security and business continuity.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
Protective monitoring of internal system is achieved by deploying proprietary organisation wide anti-virus and network protection software to all client and server environments. This is administered centrally and subject to mandatory update policies. Usage of this tool is managed under the wider ISMS.
Azure hosted application components inherit security from Microsoft Azure SLA. - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- The Information Security Management System (ISMS) implemented as part of our ISO 27001 certification includes a security incident management policy ISMS-02-009 (available on request). This classifies security incidents describes how to report them and also the activities of the Security Committee.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
- Public Services Network (PSN)
Pricing
- Price
- £200 to £2,000 a unit a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- 30-day free trial