THE SENSIBLE CODE COMPANY LTD

PDFTables

PDF Tables accurately extracts data from PDFs. It uses an AI algorithm which can see column shapes, and outputs spreadsheets. There is a web API so it can be automated.

Features

  • Automatically finds data tables in PDFs
  • Output as Excel, CSV, HTML or XML
  • Use from any web browser, without installing anything
  • Fast, streams output as it is generated
  • Web based API for integration and automation

Benefits

  • Reuse data where original source is PDF
  • Publish data instead of PDFs, without altering upstream process
  • Integrate with other software you're already using
  • Automate, so data is extracted as it arrives
  • Replace manual document processing & save 000s of operational hours.
  • Convert PDF to Excel

Pricing

£800 to £3750.00 per unit per year

Service documents

G-Cloud 11

492258199311742

THE SENSIBLE CODE COMPANY LTD

Aine McGuire

0771 0377929

aine@sensiblecode.io

Service scope

Service scope
Software add-on or extension No
Cloud deployment model
  • Public cloud
  • Private cloud
Service constraints None
System requirements PDFTables requires Linux servers for private cloud deployments

User support

User support
Email or online ticketing support Email or online ticketing
Support response times By end of next working day, but typically quicker.
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels Emergency 2hrs, Urgent 4hrs, Non-Urgent 2 days Incident escalation process available
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started We provide user documentation and examples for how to use the API.
Service documentation Yes
Documentation formats HTML
End-of-contract data extraction Data is automatically provided by the service. Data is deleted after 30 days.
End-of-contract process There are no additional costs to terminate and end the contract.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service User interface layout may be different for mobile.
Service interface Yes
Description of service interface Users can upload PDF documents using a web user interface and view or download the extracted data as HTML, CSV, XML or Excel.
Accessibility standards None or don’t know
Description of accessibility We aim for at least WCAG 2.1 A but have not conducted a specific evaluation.
Accessibility testing None as yet.
API Yes
What users can and can't do using the API Users can use the full functionality of the service using the API.

Users authenticate their API requests using an API key obtained from the website.

No limitations.
API documentation Yes
API documentation formats HTML
API sandbox or test environment Yes
Customisation available Yes
Description of customisation Buyers can post process data obtained through the API.

Scaling

Scaling
Independence of resources We monitor performance and scale our infrastructure to meet demand. We can commission independent hardware for specific customers if desired.

Analytics

Analytics
Service usage metrics No

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations No
Datacentre security standards Managed by a third party
Penetration testing frequency Never
Protecting data at rest Encryption of all physical media
Data sanitisation process No
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach Users can download uploaded files in multiple file formats.
Data export formats
  • CSV
  • Other
Other data export formats
  • Excel
  • XML
Data import formats Other
Other data import formats PDF

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability 99.99. We provide an SLA dependent on the needs of the customer. We also provide a refund model and dependent on the needs of the customer.
Approach to resilience Our service always runs in multiple availability zones in Amazon Web Services EC2. Should an availability zone become unavailable, traffic is transparently routed to other zones.
Outage reporting We have a public status dashboard available at http://status.sensiblecode.io/

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Username or password
Access restrictions in management interfaces and support channels Management interfaces are onto the Amazon Webservices (AWS) system where we follow all the recommended procedures of Multifactor Authentication using text messages and a token device. Management user accounts have been defined with limited and controlled access to the interface; the root account is not routinely used. Only three of the developers have access to the system, and ex-employees have had their login rights deleted.
Access restriction testing frequency At least once a year
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information No audit information available
Access to supplier activity audit information No audit information available
How long system logs are stored for Less than 1 month

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach There is a senior employee with a special interest and expertise in the field of IT security with primary access to the Amazon Web Services infrastructure. He enforces Multi-Factor Authentication on all access to the AWS system (which itself has many levels of security and access logging) among the team, as well as policies to limit the retention of user data to as little as possible. To date there has been no known unauthorized access of any of the infrastructure.
Information security policies and processes Our policies predominantly follow a the guidelines set out in the Amazon Web Services (AWS) documentation for its Identity and Access Management (IAM) system. These include defining users with controlled and limited access to the infrastructure and not using the root account for routine access, requiring Multifactor Authentication (MFA) using a token device, and using AWS CloudTrail to log all access events for review. The policies are thought to be appropriate given the size of the development team (4 persons).

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Infrastructure is managed entirely through configuration files. Changes are tracked in git. Before changes are deployed into production, they undergo a review process which includes considering potential security issues and typically involves multiple members of staff.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Threats to services were assessed at the architectural design phase, and on an ongoing basis as changes are made.
Protective monitoring type Supplier-defined controls
Protective monitoring approach We respond promptly to security incidents. If there is a risk to customer data, customers are notified as soon as possible after the risk is understood. We are currently reviewing our processes for identifying potential compromises and we anticipate having something in place in the near future.
Incident management type Supplier-defined controls
Incident management approach Users can report incidents to security@sensiblecode.io.

There is no pre-defined process for common events, as incidents are very rare.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £800 to £3750.00 per unit per year
Discount for educational organisations No
Free trial available Yes
Description of free trial The trial enables users to convert a limited number of pages for free.
Link to free trial https://pdftables.com/

Service documents

pdf document: Pricing document pdf document: Service definition document pdf document: Terms and conditions
Service documents
Return to top ↑