Edenhouse Solutions

SAP Business One (B1) Cloud Implementation & Migration

SAP Business One offers full ERP capability for small to medium sized organisations. Deployed in the cloud with Edenhouse's full managed support service, Business One offers excellent time-to-value to clients. Full implementation service is also available from Edenhouse Solutions.

Features

  • Multiple hosting options - on premise or cloud
  • UK based support
  • Cost effective, expert B1 consultancy & support
  • Option of Databases - SQL or HANA
  • Integrated Reporting & Analytics
  • Options for multiple currencies and languages
  • Accessible via desktop or mobile
  • Affordable licensing model
  • Cost effective support packages

Benefits

  • Implement best business practice to your organisation
  • Realise the benefits of real-time reporting
  • Cut costs with a sustainable support model
  • Integrate into existing solutions as required
  • Choose the right hosting and platform solution for your budget
  • Enable your organisation to be agile and responsive to change

Pricing

£8.97 per user per month

Service documents

G-Cloud 11

542512778826026

Edenhouse Solutions

Philip Cartwright

+44(0) 330 058 6020

info@edenhousesolutions.co.uk

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Public cloud
Service constraints SAP recommends that you always upgrade your Business One installation to the highest available release and patch level. Upgrades and patching are not mandatory and maintenance agreements and windows can be agreed with your support partner as required by your business.
System requirements
  • Microsoft® Internet Explorer 8.0 or higher
  • Microsoft® Data Access Components 2.6 (MDAC) or higher
  • 1x Intel® Core® i3 Processor (or equivalent)
  • 2 GB (minimum) Memory
  • Hard Disc System partition 2 GB, Data Partition 1GB
  • DVD-ROM Drive
  • Display 1024 x 768 with 24-bit colors or higher (minimum)
  • Sufficient bandwidth > 100M, Small latency < 1 ms

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Support Services are available through Edenhouse (8am - 6pm, Monday to Friday) SAP SuccessFactors provide software support 24/7 through their global online customer portal. Response times/SLA's are dependant on priority of the call.
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support Yes, at extra cost
Support levels Edenhouse provide support all SAP products for both technical and functional support. Our support model is time based with time called off in 30 minute increments against an agreed number of days with each day being 7.5 hours. All of our UK based support consultants are highly experienced in Business One solutions and implementations and so we have one charging rate for all consultants as well as a management fee depending on the size and scale of the required model - such as if additional services are request like out of hours support or system monitoring. A named account director and named service delivery manager are assigned to all of our support accounts. Both these individuals perform roadmap planning, and monthly reviews with each of our customers whilst also ensure SLA compliance.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Edenhouse provide onsite training, user documentation & SAP resources to end users. A typical implementation will not require additional user documentation, but will include on-site "train the trainer" sessions to key users who co-ordinate and delivery training to the user base. However, at customer request training can be provided to end users and additional documentation can be provided. There are a multitude of SAP resources available via the SAP portal across a wide variety of subject matters.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction Approved users can extract the data from the solution at the end of the contract in CSV format.
End-of-contract process At the end of the contract term EdenOne will provide an extract from the solution in CSV format. If we are required to work with an external party to transform the data this may attract additional charges.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service The Business One Mobile version has a limited span of functionality in comparison to the desktop version - this can be customised dependant on the end user and business requirements.
API Yes
What users can and can't do using the API Custom APIs are to be agreed with clients on a case by case basis. The majority of functionality and services available through solutions are available through APIs, web services and integration points.
API documentation Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
  • ODF
  • PDF
API sandbox or test environment Yes
Customisation available Yes
Description of customisation Possible customisations include user interface, data storage, reporting, work flow, authentication authorisation and multiple integrations. Authorised users can customise the solution via a third party application recommended by EdenOne. We would not recommend customisations are developed by non SAP consultants as this poses a risk to the overall viability of the SAP solution. Approved users and EdenOne consultants can customise the solution.

Scaling

Scaling
Independence of resources In relation to the availability of consultancy and support resources, Edenhouse have a successful capacity planning team who ensure that sufficient resources are assigned to the teams in order to provide the required level of resource for our customers. In relation to the demands put upon the hosting services there are a variety of options available depending on customers requirements that ensure that the resilience and availability of the service is unaffected by capacity demands placed upon the solution.

Analytics

Analytics
Service usage metrics Yes
Metrics types To be agreed on a contract by contract basis
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Resellers
Supplier type Reseller providing extra features and support
Organisation whose services are being resold SAP

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • EU-US Privacy Shield agreement locations
  • Other locations
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least every 6 months
Penetration testing approach ‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process Yes
Data sanitisation type Explicit overwriting of storage before reallocation
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach To be agreed on a contract by contract basis
Data export formats CSV
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Bonded fibre optic connections
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Availability and resilience
Guaranteed availability To be agreed on a contract by contract basis - as a general rule the System availability SLA is 99.5%
Approach to resilience Depending on the hosting option taken by our clients, there are a wide variety of resilience steps taken into account. These can include:

* Redundant additional power network in case of power outage * Backup batteries and generators * Redundant additional coolant systems in case of coolant system failure * Redundant additional internet connection to guarantee connectivity * Data stored in backup location to save-guard against natural disasters and malicious attacks
Outage reporting To be agreed on a contract by contract basis depending on the hosting option taken by the client.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels Access is restricted using assigned business roles and organisational management assignment. Restrictions are contextual (e.g. users can see data relating to them, their team, their territory; managers can see data relating to their team members) and can be restricted at different levels: * Screen access (work centres and views) * Fields can be write/read-only or restricted * Actions (e.g. escalating a ticket, exporting specific data to Excel ) Additionally, page layouts and the model rule editor enable setting attributes including visibility of screen sections or specific fields by business role or data (e.g. hide field "x" for complaint tickets).
Access restriction testing frequency At least every 6 months
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 British Assessment Bureau
ISO/IEC 27001 accreditation date 26.02.2016
What the ISO/IEC 27001 doesn’t cover The scope for Edenhouse Solutions ISO27001 accreditation is SAP Support, Enhancements and Projects. What is currently out of scope and therefore not included are the following areas Key management – we do not have a policy on the protection of cryptographic keys as we currently do not use these. Working in Secure areas – We currently have no procedures for working in secure areas as Edenhouse do not have any secure area working currently. Secure development policy – Rules for the development of software are not in place as Edenhouse does not currently develop software. Restrictions on changes to software packages. Currently no procedures in place as we do not develop software. All of the above would be reviewed and policies created should they come into scope for Edenhouse.
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards
  • CSA CCM version 3.0
  • ISO/IEC 27001
Information security policies and processes All of our security policies are strictly aligned to ISO27001 Standards. Our Consultants access our B1 customers' systems via secure https connections that require a unique user ID and password. Any email communications are encrypted. Edenhouse is accredited to the 'Cyber Essentials Plus' standard for all its networks and infrastructure. Reporting Structure: Our Chief Information Security Officer is Delivery Director Ian Fisher. Beneath him is our Information Security and Cyber Essentials Team. They ensure that our users adhere to our security policy and processes and these are audited on a regular basis. Each B1 customer has an Account Director and Service Delivery Manager. The B1 team has a Principal Consultant and Team Lead.

Operational security

Operational security
Configuration and change management standard Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach We align our change management processes to the customer's requirements, however, for internal changes we have a Change advisory Board to review all change requests and approval is only given from the CAB to proceed with any change.
Vulnerability management type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach We have an Annual Vulnerability check and based on the findings from that check we create tasks to eliminate any found vulnerabilities.
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach Our Data Centre have a Network Operations centre which continuously monitor our network and communication lines. We also have internal monitoring where we run an average of 5 million tests per month.
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach We align ourselves to ITIL incident management processes and use SAP CRM toolset for the incident life cycle.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £8.97 per user per month
Discount for educational organisations No
Free trial available No

Service documents

pdf document: Pricing document pdf document: Service definition document pdf document: Terms and conditions pdf document: Modern Slavery statement
Service documents
Return to top ↑