THE SENSIBLE CODE COMPANY LTD

PDFTables

PDF Tables accurately extracts data from PDFs. It uses an AI algorithm which can see column shapes, and outputs spreadsheets. There is a web API so it can be automated.

Features

  • Automatically finds data tables in PDFs
  • Output as Excel, CSV, HTML or XML
  • Use from any web browser, without installing anything
  • Fast, streams output as it is generated
  • Web based API for integration and automation

Benefits

  • Reuse data where original source is PDF
  • Publish data instead of PDFs, without altering upstream process
  • Integrate with other software you're already using
  • Automate, so data is extracted as it arrives
  • Replace manual document processing & save 000s of operational hours.
  • Convert PDF to Excel

Pricing

£800 to £3750.00 per unit per year

Service documents

Framework

G-Cloud 11

Service ID

4 9 2 2 5 8 1 9 9 3 1 1 7 4 2

Contact

THE SENSIBLE CODE COMPANY LTD

Aine McGuire

0771 0377929

aine@sensiblecode.io

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
Service constraints
None
System requirements
PDFTables requires Linux servers for private cloud deployments

User support

Email or online ticketing support
Email or online ticketing
Support response times
By end of next working day, but typically quicker.
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Emergency 2hrs, Urgent 4hrs, Non-Urgent 2 days Incident escalation process available
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We provide user documentation and examples for how to use the API.
Service documentation
Yes
Documentation formats
HTML
End-of-contract data extraction
Data is automatically provided by the service. Data is deleted after 30 days.
End-of-contract process
There are no additional costs to terminate and end the contract.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
User interface layout may be different for mobile.
Service interface
Yes
Description of service interface
Users can upload PDF documents using a web user interface and view or download the extracted data as HTML, CSV, XML or Excel.
Accessibility standards
None or don’t know
Description of accessibility
We aim for at least WCAG 2.1 A but have not conducted a specific evaluation.
Accessibility testing
None as yet.
API
Yes
What users can and can't do using the API
Users can use the full functionality of the service using the API.

Users authenticate their API requests using an API key obtained from the website.

No limitations.
API documentation
Yes
API documentation formats
HTML
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Buyers can post process data obtained through the API.

Scaling

Independence of resources
We monitor performance and scale our infrastructure to meet demand. We can commission independent hardware for specific customers if desired.

Analytics

Service usage metrics
No

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
No
Datacentre security standards
Managed by a third party
Penetration testing frequency
Never
Protecting data at rest
Encryption of all physical media
Data sanitisation process
No
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Users can download uploaded files in multiple file formats.
Data export formats
  • CSV
  • Other
Other data export formats
  • Excel
  • XML
Data import formats
Other
Other data import formats
PDF

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
99.99. We provide an SLA dependent on the needs of the customer. We also provide a refund model and dependent on the needs of the customer.
Approach to resilience
Our service always runs in multiple availability zones in Amazon Web Services EC2. Should an availability zone become unavailable, traffic is transparently routed to other zones.
Outage reporting
We have a public status dashboard available at http://status.sensiblecode.io/

Identity and authentication

User authentication needed
Yes
User authentication
Username or password
Access restrictions in management interfaces and support channels
Management interfaces are onto the Amazon Webservices (AWS) system where we follow all the recommended procedures of Multifactor Authentication using text messages and a token device. Management user accounts have been defined with limited and controlled access to the interface; the root account is not routinely used. Only three of the developers have access to the system, and ex-employees have had their login rights deleted.
Access restriction testing frequency
At least once a year
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
No audit information available
Access to supplier activity audit information
No audit information available
How long system logs are stored for
Less than 1 month

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
There is a senior employee with a special interest and expertise in the field of IT security with primary access to the Amazon Web Services infrastructure. He enforces Multi-Factor Authentication on all access to the AWS system (which itself has many levels of security and access logging) among the team, as well as policies to limit the retention of user data to as little as possible. To date there has been no known unauthorized access of any of the infrastructure.
Information security policies and processes
Our policies predominantly follow a the guidelines set out in the Amazon Web Services (AWS) documentation for its Identity and Access Management (IAM) system. These include defining users with controlled and limited access to the infrastructure and not using the root account for routine access, requiring Multifactor Authentication (MFA) using a token device, and using AWS CloudTrail to log all access events for review. The policies are thought to be appropriate given the size of the development team (4 persons).

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Infrastructure is managed entirely through configuration files. Changes are tracked in git. Before changes are deployed into production, they undergo a review process which includes considering potential security issues and typically involves multiple members of staff.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Threats to services were assessed at the architectural design phase, and on an ongoing basis as changes are made.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
We respond promptly to security incidents. If there is a risk to customer data, customers are notified as soon as possible after the risk is understood. We are currently reviewing our processes for identifying potential compromises and we anticipate having something in place in the near future.
Incident management type
Supplier-defined controls
Incident management approach
Users can report incidents to security@sensiblecode.io.

There is no pre-defined process for common events, as incidents are very rare.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Pricing

Price
£800 to £3750.00 per unit per year
Discount for educational organisations
No
Free trial available
Yes
Description of free trial
The trial enables users to convert a limited number of pages for free.
Link to free trial
https://pdftables.com/

Service documents

Return to top ↑